Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 12:22

General

  • Target

    7758bb9f8d6a231486381789bcf74155.exe

  • Size

    191KB

  • MD5

    7758bb9f8d6a231486381789bcf74155

  • SHA1

    bf08b1a6a30a3b47a22b7a8672294fe21f6f17be

  • SHA256

    b8d34f2a812854d0ef328a5474d0f9efb11185479270752b7cae0b83af5feb4c

  • SHA512

    4efa852c494f3cdc7f1c45364a976835ffbb2787a0c8ead650c15ac39c4e14caf17297e19b8199935c4ea9133989587f418fb203709f3dddc236b0b559398a16

  • SSDEEP

    3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vP:PWfUkBPyrtBxgQTMK0TKpxS3H8j0b0

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7758bb9f8d6a231486381789bcf74155.exe
    "C:\Users\Admin\AppData\Local\Temp\7758bb9f8d6a231486381789bcf74155.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=636
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5f95341e88222c231e23f5628b20c18

    SHA1

    d0bb854693b56177395a849434c892aab8145dfc

    SHA256

    63e77f611b7b016390b006d373385c4c61bf1057b2632e62157727c34c036923

    SHA512

    c8bc315db346e301e156cfa97dbcd8649251ce8cfee6ce0557a0128480ab1a3c6344bb98c61545e6941f544d5bb896cd994dd30aedd76824d94fbaff97a4a80f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f5e1970d30a24defadfdd925c9553dc

    SHA1

    59175cb7d15b4bcb9a5ea96acd2d368714a289f0

    SHA256

    0eafb29a9143763613d49e9a4e9082e606c583f17502859e3892287a65b55bc2

    SHA512

    f0a9fbc0135ac8cc180d79b0f8c8346427efa702eea2a6fb89590f3cdb0565851f11b413201b068acf18cf582d5f4d149dc55536e2b320a3a513426ec272b0b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b934feca0a45818f73bb5857a307107

    SHA1

    29ae860e23b909ed7094822518c3c113bdd0e874

    SHA256

    46e39e333f3da5d0cbb579075327d92e119b6704e52660bfbb2a95be9b991485

    SHA512

    42c8f173139335db1098f972a7f609adb307318a3c3744633e218e8a7e62225eaeb67064ec7a83f6fbe6524a4ce57bb0c00d444389dfd07e85bd06329da4ede5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    869851758048bb83af43cc784cc04034

    SHA1

    498dd0a53a9c7cd58fc92f1838bbffac42855e3c

    SHA256

    6696b4fc3462cfc4c0d00a962cf05e323e4109c36c989d47f6835c2a7fde5fc3

    SHA512

    d300ee8b2678cf8924641edd0cdd75f375bbf5a595274cfa44a440e5df6583bb5869d74323e8aa7012f2760a60bf43a46362f396bcb687d99d8acc93cc39a11c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c31a9e4858404d28ba7c0ec8e946e925

    SHA1

    ca45fb2914c69f946a5bf5c3742e2c3359feb332

    SHA256

    f27894acd6383491916e993a2642a6ac68e629f4b3890be4e5d1495c08b0f7f4

    SHA512

    017c68767dbbf83992abd0ce11325ab867fb825b5c8f26ec78ebd710bfc5069e3452f5ce7a7c74397b74d03fd87bb1129fa6c52c916c8f7030582b585748f692

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    112fb47a99b2f237f0e058a3851f0e0f

    SHA1

    8a0cf490afa25baade358193304c20a9aaa51d21

    SHA256

    6b81296956b24988fd07d79d9b8e737a285a68d7f202b7423a32379e450f54c9

    SHA512

    bcae02b0306dcb209ec7bb8baab0c9ab1c57b98492644c75f5f719118dffc80c3c611dc5d9d292251e6f240a7a25be97211fc36bd98f69c480129ef80cf4350b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e9310a90635ab24298a73d8c5f856a8

    SHA1

    d3faab272189e85eca3fa3c56b0d7e92df617aff

    SHA256

    c40832648452f37f177e127754be40c03c5fbdb27e2ac23651afbeceb7a15526

    SHA512

    1efc3430b4ea586fb5cbfe7d8f78dfc7fb389d6202469eabb9d927456f8db241703a9be06d5f82dfcbdf319c963e983b4734c91356fe24e04a1800a97fbe998e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f06507ad31b29a0380985e8a4978802

    SHA1

    52df5d2aa8410a2a2247815eed47844007db595b

    SHA256

    d3779370af6888537fa3af024c80e412311976a88b78c239b6c1d34a768829c8

    SHA512

    c663ba3b8f31346ceb1e946ec2d2fcd343bdedcf1a6301991dc0857666b6aaae5baff6a3b77f518591f836f1cb791e8e1fa6fc6c479d3872aba2fd0f73ea5450

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f706ac35e0da9ce5593393d894c58914

    SHA1

    a34c9429ba18ca96992c2402083ce98144b0e8f7

    SHA256

    0e5b6950d5d1c4af77ce089be395b4529c981ff8a0e31e424d419661845d079f

    SHA512

    2496253159fc8c1e7306c2648e2493cf5f0e7c5d91ff19e2439190d6dc1a13c654365d6686729c191d1671e6beb85b6193cdcb394f6e74fba1a9d0485408d615

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb772028dfa2f091e4638d2589fa5d95

    SHA1

    da0d54dd46c6904cd0f005d850bea5ffcc4bf79f

    SHA256

    d075988f24b4cc13d809f94e93aab7c1316043d305d65ffdb52c64be07f00483

    SHA512

    c631b0ec6979392caa8ab1905f1b88e16a79242e638042f554f70c34d32cff897f49df258b7d1491e02647851831bc9c0dd0a9efdc3dc8321b2ce00460de78f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d1f161adfc340aa5d2606b55fc7ae0e

    SHA1

    cf9c8750578fb55a3d4fc957c2a551e87f9736d3

    SHA256

    3b352e279616ac07c7649c45e2b6d82350757dfcdc6f6050a3022ed829be1f6b

    SHA512

    410ed871c2c02ff8a5af691057c71bc614e2c8f37f9c996036a095aa390effaf80a75c3ae6864ab6f51074c3a01fdcc1917f45e54fba4b45b3f4bbca436ad04e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    49b93eab49f2409f28afe1f051901432

    SHA1

    f1efe96b3a1b239169277a978a8961a97aee756f

    SHA256

    496a75c469508559df09d6de1cc70962fd4e4c0c0025b216b3828623d84c9b15

    SHA512

    da4548c79d384d98c8263e2b8cf116aba5f3e75cd71f9421f84e6cc1da426e8df367695da05039f98c05ed4bb0308ee8a89da76edb4473e20514842655111eef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    487ec16c55c0c12800b9ecea4d1f5309

    SHA1

    2726847d7895fc4d600b47279f6621097c1aab41

    SHA256

    91873e3f7d52066da5f704e25c81e328a8eb25cb7c88120d6d633fa96d07982e

    SHA512

    841e6d2f5ede01433d8461f8f254f312278a7cd8c2dc1331ae6cd07c3e3c97cd6302d140d4764ea04839b9c7dc395a6a355bf6d48fb09dbdfaff85e5d8fe8cde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6126c62bf4f384820f304b90b04afbd6

    SHA1

    0edf876e0fc64998df256bd447385701aea734fe

    SHA256

    dd06e165d636257f27bc3f830ee5743a6bac81a980471a24a963beef6b9e66fe

    SHA512

    d9cb5050ceb9d05aea5e04a2f1cd4213076944b1dffefc91f04e3f1de1027be9c986c59cc891655a20aaf5c7f42c43ff17fa73d4a0d74eb20f37430cd680d107

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6be546d6c2d69432cb7c3adc2c1a2f08

    SHA1

    8358407255af1be02a287c15526d7a51f3236e0b

    SHA256

    78e0f7ba217b92cd77315a2b32def4d4b3c16c3a94368dca58f40799dcfa8ec5

    SHA512

    c0d950f4c01c5f64f3dacfad90bcd67230a9e5b3a0d4f35f1104144b80223a4b8d814ddae738ea2d52568048843672797e3e9e712d33d0735c8e4402b087432f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    016781e98137a4940a334adcba6ce4d3

    SHA1

    8873f13eaafc30f7c2889ef76e405a6779061610

    SHA256

    5a013226408c70ce70ba6dee5410f1e0265fbc618fcfa92ec6fbccbb98c62b73

    SHA512

    082b39c25e5823baf116f816161156fb5bf44434857d27695797e76d0fd8b5d8c1069bf13a7d2a1597bbc88cdaed2f18b73aaba9610a22f4a54eacd2df4b73b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6690d299f0b6ea678c8405b9a9f07c38

    SHA1

    793b86df178517f86ae103cf32979d018e3a4388

    SHA256

    890641e1361a83324189757749f3666dcaaef11de035c01397c826072b74ff88

    SHA512

    397bf2e13568d5a29768d900cefa79a7e5da744496ffa3ac97a932d8ad4a54950dfe62ae5041cf0f5f833e9133a017c3c9b6be395df4a11f42e0a883524f29c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb2bc62fea2be030f90b85aea82f35ca

    SHA1

    2478e3667667dfedbfd8d0dda31eceb287741010

    SHA256

    b1175927e11a87713ac44cb13ed648bc2c24389a2ecba3bf4a21533b6364250b

    SHA512

    62ab98f00d2380f7b636657c169571a961512269c70be9cf40035d5028259d95a4ae616890a55e594b4abfd6653a6d01ad7e0f5b72fe6752ad194f81e252e683

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    971a1c08389d35da23a40128a145442a

    SHA1

    487a2ae7b7a8ab8c7065f49f7188e7accb8478c1

    SHA256

    cd55b9981b7dc20799ea2284aaad271079ba3fb773b402f444d42bc570942214

    SHA512

    c7a9ee9d649d8e46b3645c36fc05c3fb78d61d0495f71c5ce0617030553639d55a362d77f2c471531812e914e96519bfe1dd16a1692c6bd334340abcec898607

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eda0f1db42b14db36d7b5e5b724e7f03

    SHA1

    827fff4b123547ba3af28fe364bd9de1ad12e4e6

    SHA256

    a1bf4ba13384b6d4c0389e6487abc458a741dc31b169162d4bba76373a20b565

    SHA512

    11bde6477d0830293a3fc2818460670ee94597889721c98cb22a3679433467e4c0553d89f26b7c38232205b78a1243fd878b2a063221ca3af1b77d2cc21fefae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa935543e3a95cbfd61b9c7001d448ca

    SHA1

    1aead81b73ca172d6094832ff7911e4d7ce2b3a2

    SHA256

    319dd5d6b67564136b65d676bab79185fa5738d0444bec5dcd2e3a34ebc3d536

    SHA512

    770a95e2f901be5dd3628829375226d582c02d5e70c1775485e6c83578504393e4d1303ea8314e0bf88d2cefa3ea294756a16e96c4e85a566c9fc3755417d5f5

  • C:\Users\Admin\AppData\Local\Temp\Cab196C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\FG.url

    Filesize

    192B

    MD5

    0fcf82b5a915470e8a79d3516f582a36

    SHA1

    75f81b41607905b231521243129aff3554a58db0

    SHA256

    076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4

    SHA512

    adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293

  • C:\Users\Admin\AppData\Local\Temp\Tar1A0C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1992-26-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB

  • memory/1992-0-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB

  • memory/1992-24-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB