Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 02:37

General

  • Target

    713958ffc1750b45eceebf05b77a46e2.exe

  • Size

    46KB

  • MD5

    713958ffc1750b45eceebf05b77a46e2

  • SHA1

    94088ae0da24850b1724e3bad9b1ee7926cbe78c

  • SHA256

    298923fddd53cfbf9ceb94bab075f73fb0795629e47ec5f3d6906676fae2ce61

  • SHA512

    585b07d9815ac8a943e3e8130ce3823a8ab90d64d10b080f4cdd3bb5e69f12d65c296fcae8f1ff9c3bbf63eab45f81cb316521d0cbf341e9a7c32eba17f3a4a7

  • SSDEEP

    768:1tyFqk0QogowYZHOOgVUkdnTCkjC9CwGDGn2mXGg0aaeJC4C0G1GeGBGXCwCLCpm:1MFqk0QogeOBVUk9TCkjC9CFan2mWg0E

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.prohosts.org
  • Port:
    21
  • Username:
    ph_1347091
  • Password:
    24091972

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\713958ffc1750b45eceebf05b77a46e2.exe
    "C:\Users\Admin\AppData\Local\Temp\713958ffc1750b45eceebf05b77a46e2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.executivoclub.com/inicial/mulher/index.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2676
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\713958ffc1750b45eceebf05b77a46e2.bat
      2⤵
      • Deletes itself
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ae513e43262a7af1cd86416f844761f

    SHA1

    ac0479317744b1f06db2f5b17a272d9daae1a589

    SHA256

    1720e897fbb32acd90d298dc2559e18a49eceb41cb25e333dac0b74ac7b9b9f7

    SHA512

    ebed029d0a9ee67869f75e832ab57a4d3c6411cd8bb3947d0a67ee4f810a75ee86a1a49b9cc02e7b8ca2a254ff44ca9492c889cef46a4336e1b1138b0f2abb4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b31537d2f221be56001743ae3aed93d4

    SHA1

    d13a5f0d80b421509cdfa00869a73e3d25922934

    SHA256

    39066066ab556f7c81e4bcf857e71fdc5f9351d4377d7aa6c47b956c10c519c7

    SHA512

    8cf2affac06762f2b3e42f5da2ec906c860a0952da155d4d1147c50253d15f1eca7856e62d97529257c684b6e004069b1ab0d88326ed0dc9710ba618830f005f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dbb8a1773cc5ec863a87f9bfe804c9f

    SHA1

    c9e0fea5a1b8ff715478f888cd961438195c0e1d

    SHA256

    16f8c000883eb6b37b47855e28c539ba8bfaa582f96a8e0e7868847d9f1f90b6

    SHA512

    93a68e8d14deb44438f30a79a00d69fd2d52c9c6aa4a165a63d3e1ddda9b56668a1b0c5b0fa97cd5d4c0642411aca1dd8536f7f3a5198ace484777e3237c410d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d02d3d203475b42d90a5bbb759781a7c

    SHA1

    03f37069786d2e28c36414bdb43e9d7f75c00909

    SHA256

    04f4b5a24510b07e36626e6d78572e532271e5e9f655096e2bf6386a330b1223

    SHA512

    20fa4b148bff0f12a624023097a70f155c345201f5398bbeab01a6db6708431fdbe0ccf906661a6ab944c975c8a7349f00e8afd04e1d7d3f3028bba8991d5b0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1589e7b971aaebe5404456387b341942

    SHA1

    92f4aae760c9a36c96c08e8c7a937be25c02af95

    SHA256

    da9d5367c526f555a46b4e284c58c8754b28144dd717ee89bcfcb74932a33ad6

    SHA512

    94064691237e8e40dcfc8fa0a592dabc43a2fb569077b5a6323e4c43a5d0e7e89475c6610923d0d2027d025c37d0bb13b7f176ffaf89bb323769446c60a8507e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa6ad6a1b939bf56eaef24540f8f5250

    SHA1

    51924564706017eab5a1f3ed136e311050c36a86

    SHA256

    d4baf6647ce5c93915bcf5fec14a5a93e04e51e6f2dd32e832cc7a1120955d94

    SHA512

    b55291bf4d26fd0262156404b10694eebfcda92444913d845de0ec7024b73d77ffa9bdf957e3056922368abbac91d37f1dbd832b07bcbba6f2833b20ec3085ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c07d5c977cd7a3fbae535e7716bc591b

    SHA1

    964a36e7dc4757382cda65fb59bd64e27a7848c3

    SHA256

    d85c9bf7ed50dc6941994b551c42772b522094f59c2313dc168b71ecb9d1e4bb

    SHA512

    96f4fa0a2373d1ee2e4815ba17860451b81bd409afc2fede32d13b0601c0042f2fc6984e6566ab93c8c7df63928a4d882694cff2e4002d929cd144e415faac69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdce71bdd53d7cc0a79bbcb1f061d353

    SHA1

    6b969369d994ce805c4dedebcf3e91b2e87d5881

    SHA256

    032a01032acf1cb959ed072942b40ef7a6b614b8066d0e0add4dd8f7f7a8a916

    SHA512

    0a0f685d16f87e432d492e10de057789ac0171c36989a7012ff59d87eda4b6f58a4976fcc91ecea2b263cda7072cb99b631ceb715b9ca55f4723e4ee66db1315

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68ed7daa94b895419aafb879989bc03a

    SHA1

    61ee813cc573c148027b3fc928f3593c6abd2a36

    SHA256

    355a26bde15e637628f9f6a99b1b81a38a7c22560dae9539980d614647881d75

    SHA512

    55af4cc1763942e29166a9ea5975a59331a21a6a89ea2181edf30f7a32b0f996c94e1a53035f40be9669c8e163871efcdf2186bbebe9283d54d750059c2cb02e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fae58864e98c50287f3564ed1e7b11ed

    SHA1

    a525dc5995ea482460a2a8a83ff46d83c7eea185

    SHA256

    72b8164716b5cfbb105c5ff34cad8916471d67c7b3fc10ed52a876bc94d22f2a

    SHA512

    d4e89def09b57c2d350eda30617c5f0e9ac9ddd17fdc9a7e186f615b275152698277e6db0f7f333af9526486e123820a3b827211bb608b50d37283b5fe3642f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9d7f56bbdd29773c938e195a5e4caab

    SHA1

    8c01f3258648be28f06093a5b3e51c1e80ab0b22

    SHA256

    07b4656ea23d47fc748d97a44331a24c00ee4d7440bd0b74d57f78248e464a43

    SHA512

    0e2103c86d89053383ac31a72cf8a0151c69071570371344f54066fab2f65541827ecb5816f4919bea0fda93f1ca6708713aecaab4650525f4357f49760d18c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b266e1e520f8af6fb1948ea3de9189cd

    SHA1

    7a8a5babbd66c843982caa7c3751008d3d540c39

    SHA256

    d2c53d3cd97ed8dc35ec5051f044f692ac40c2a5384e1c1a15924a999b804dd1

    SHA512

    3c6ccd070441f15ce7811d890bf6799fc3d21270bf041e2d59473be97ca69c1df262f4c32b8028651f885351e36edd86f8cc9f00ccc29c4b00f9ce891a3066a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db6c55f5a575b07b0051acf715967a70

    SHA1

    26de4e7ed921f284db2ba6cfcbe9b66dce537454

    SHA256

    be9d1fe4e6194f55115ec42adb15b013e4dda45979a96412efe6e1db62e86c4e

    SHA512

    dd92470b821f0e76372cf34ab06c6b12578ad1d40f71f4695b467d793717bbb566bbd994e3edc791af4cf914dde79e9108cda2a2b7d30a9b6f86bdf5da8907dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe10c347b80b729749700eb8603106f7

    SHA1

    230b4644e9e1aca67eef5da6f934fe1686fd8dbe

    SHA256

    f605ec6b5352a4d7236823ec935e782f5c839c0093aa079cf9174fbfcf57b921

    SHA512

    89d0c39a50c0354215a6a1a013cb4a224ecc1463003ff199458d3eca3e7cbd745155102ade728249cac86be09084256e0d33f4082f4bef0ee36187ece4c72420

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa7f61d34abd3f33e314429733113689

    SHA1

    f889b47a9d231ae1e7a2440ea7350760e16102ea

    SHA256

    2ad99675e8101512e23d6dc644d0a2dd261f2ec251c616c15be67418f8e5429d

    SHA512

    60cf47bf26da0dfebd305d8dad8cc67185b28cf626bfab556d57cd4dbb846ab5aee115ae289c2812b9ffd186db7a5c3211793c4df9672fc324b8d2cdbb1d8c1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d579e196919ba4c0a8e4db830635e6e8

    SHA1

    dcb6c49262ee362861d83d1b02706fe1a9d254f1

    SHA256

    d59f9bab9b6ed735ed9e4093aa63009964d61059477584f2ab67dda6d211c985

    SHA512

    6fa5981358ba59f730d59403c609f2bbe41a49ac9378f57d2d5d5d22a0a527127cf981998aea350ae2a395557b0a963fa9aa0ba5bafb48a5bfe8ced0c19cf9ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6e5d19d95cd9d401d229c9729a11456

    SHA1

    f78ea3b1654a12dd4f10e1b83fb22bafa6369211

    SHA256

    4acae842233606d0ebad5d4389a5f2a12388c48ab6bdaaeba4350c14b6f2f704

    SHA512

    0216e2c1650623aea2f790b1e7af527615a9e6e1c887471b37c67d72de6f06d2b63d77cf4c3e83351ca05f6a9278716fac1a128d343339cd9d0510c07c0bbce4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    982db5193ee2d740ae0bf77f4fbb1435

    SHA1

    75e384768ec77d9ef406f776f100e611cb755d83

    SHA256

    2d4a153ca2122f47d99f1d1d5ab44931eea57f2a8c38bfec03379b9114337446

    SHA512

    0795edbede295e1db6bc9935a2d5675a0a2e1997d11791c5c3e6279798c8424fcae669ae975f7c667b9ebf14a3835f968ab0a168534125ad8c45af4d52389112

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd77e59cf98e23a02389812146999fb2

    SHA1

    6f17d5316c608c314855c716505db1cb6c4f4998

    SHA256

    544e05b1093f73b3e9b214575407a85019f203f0c31a78c34f6112c17048915a

    SHA512

    c057e9219aa9043ee76da7d08c2fc778f7219bf65efa67355f9b583fc9638ed76b17089de03a39462cec5713ccb818857824a1fccb9bcace17d7ac2467f87f30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93ef0f462a0f9208f09acd630a8ec98f

    SHA1

    b0ab54119fea96d94670c61cd0b8a7f155090ffa

    SHA256

    f3a7d374edb4332540eb4ddccd91ce630cfaba249176b24f1ff727200a6af3c8

    SHA512

    b92c65302f909f1998bebd3324094c61db2cd0f0945933f1825a922ac92fa8fd4c22ff782c01c5b4809443c669cff851ae9be2e08c8315c0c178764199e00f8b

  • C:\Users\Admin\AppData\Local\Temp\713958ffc1750b45eceebf05b77a46e2.bat

    Filesize

    254B

    MD5

    0ca6d706eaee8a74aa17be169a3b5841

    SHA1

    a93f0a63f15f8ae7df14624bb2c1d52a75fb77e8

    SHA256

    32a272678d54cacf5b393c748d7de31e0cc410ec0db9738fc8dc30f5475f7118

    SHA512

    f88c6385580730e01ed6415978d6e54f07cb2cc06a53a8171390d8471ab7d702dc9b8a522f29920993d247e1a3da3a02fafa3e604d9449027c58dae78cb53216

  • C:\Users\Admin\AppData\Local\Temp\Cab6808.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar683A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2424-286-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2424-278-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB