Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 18:51

General

  • Target

    QQ刷钻充Q币及图标点亮器.exe

  • Size

    252KB

  • MD5

    173fdc505bee076ed9ef0b991048a4a4

  • SHA1

    cf02f8ae6707f0df59970d3770bc713fd7210594

  • SHA256

    885702e53a7fbbea60e102bb8bcae00bdd5b2a88bd65d28e1ba0d78097b16f0b

  • SHA512

    5dbfa1d3417f830d0b1f12a72ca5144f437c3109b13369885c35c71c7691afcab1e4efe0582dd934e19adedbf525c57f099ad69b78b2c3e58344b79d0a36bbf3

  • SSDEEP

    3072:JyDt5sl9x0wpWF3CGEVJDt5sl9x0wpWFlZDt5sl9x0wBWF7t:JyjyTWFSXVJjyTWF7jy7WFR

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QQ刷钻充Q币及图标点亮器.exe
    "C:\Users\Admin\AppData\Local\Temp\QQ刷钻充Q币及图标点亮器.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.niuniu980.cn
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d44f84ea2cfc42733501015626980a9a

    SHA1

    516fa84a186bd43de5a6bb28b1dccbe8b19730b5

    SHA256

    ac302de0deda351b88ae92a0108ac64a74270c30c07f305d26c136ee90fdfb7c

    SHA512

    950f466ed379113d6b7f3572c44c3f52895dc40470e999dc66027c6045b847dca47994dc6407b346d7238fc37542781acbb1017c3dc3cfa07d4c7b5a65c8f7eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c7bc80b3fb8a2ca8b802735c50b83cb

    SHA1

    26c5ea41d18cf5e50d7ab0848e1588001075f71f

    SHA256

    b55176c09e6c4ae677b3768352c48a6b7deec96fdfa09f347fe1f8c6588bc313

    SHA512

    d209a78808c7691ca17091e114f05864be1d988228ec20e949832c71334312410de8ff01dcc2aa862a6d6ab740204b0379389bb05af5287645f51b26bed18b85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88e3c1f00b3b7d331793b4efc1de5ceb

    SHA1

    7329779d3a1400d7347dd3093cde2b86b6bc99d1

    SHA256

    4bd1dc90a52bc8c3e8b1c25eb5f9230d033ce1c9bedb47cdfb916400143b0817

    SHA512

    55c3c2e079db73722c2fc9cbb16c0709492ff6fc6c613b32ab43be364241a05975b80e56b7c55d560625561e25e3cfc2fc326366917c5c774c6f4cb4292de918

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    936b5319f608b051f3c882c45e0e8554

    SHA1

    3dde0e4c96bcec52e8648d9dcf01fa723cc97e0d

    SHA256

    8be1b259eae695337f0146c7ae001a3545de4ecc7107152092110e35b7ddeef2

    SHA512

    d0bb4259cdef64510544ac82dcd9243482907480ff1dd2786fc642d1ce324b051e88778ea9941bd36a9f6c200eed5f3c76db86867e30328b78fad7a08f475e3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4bb5843ca58c3f4f4c6ee3eb19c6be7

    SHA1

    fc751d52780259cc6bd3c33a1333bb90aeed3817

    SHA256

    6872f4c82b972e9bbf02b5593848ef6b483f40769603c8d611e06f4fbec2736c

    SHA512

    fdab9a23aa6bb883077f990bebfc86edc6750fbe88acb151ab805bec9019284ee737463c7f32db86cc2347cc018b361e127fa0e1dc4b39a15a1436e8c6da18c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8518203565ec2119537f3ee342bf86b

    SHA1

    32ca7b58c796c193f5c5d0ece5735ea0187dc867

    SHA256

    08e6b18e49af77de9a5c2e39118ba3c0a1d1f2425ad3eb952f5db034553a7388

    SHA512

    f368484c926f7ad2e8b6f71fe337d6a403201baba300f221e7b6f2145da81eed8279b60b67362a3ca38955c914e98bf702c0ad2174ad5ae3391fb28464bba976

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    672b848af6a8830f9d06b869a13c2472

    SHA1

    b78cd6ccc58d1dc297731d53de3a535818e420a6

    SHA256

    6924a6bfc4193acaf632b07648f7cc0230b567fdbd17d85d1f8979c31f68b686

    SHA512

    65edbca6933a4e7c2ad7459012eda408531290a4c927d601a1ad7e832459d98b7f8874cf6efb7157a8040f60f76d8b518140c48d465f1e6d5aa8702d87ec549c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7bf841a30677147f6b7d62202ddaeeb

    SHA1

    631174373069fc233aadf94d641571084f451eb0

    SHA256

    8ea4ed2eed41c3f8453e1098d5fa4554555befadf93d4d05c3991b5ae001d6cd

    SHA512

    eb1d19d4d9749aa7bc7e94583dfc91c107bcbdf8cb5c3a92f17d967e82302f861f10a229aa45fa14844fc54d433659f8a033d6e6cbf87e8b6427a5c4fcd3406c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b318558315c3ce5ca69ed9fb28c5485

    SHA1

    e9bc48fe0bd188af01df9c7218234a1eb2ad4810

    SHA256

    e29dfa5bf61f433af2c01154b7504546d9fb001ed85b9695869127d2fab28818

    SHA512

    d9d3430127e6e23cb9433a7ed1b39dd3d3041fc4141217654b6c93700a4edbf7efdfa4aa69bd06c7b14b95dc2ae2f5a192cd92769173e5ec3c0bc6899acefef6

  • C:\Users\Admin\AppData\Local\Temp\Cab3298.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3327.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06