Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 05:52

General

  • Target

    c29b6abf62592fc73f4f07e24f8f7b87.dll

  • Size

    568KB

  • MD5

    c29b6abf62592fc73f4f07e24f8f7b87

  • SHA1

    d50fe8f6f9cf2dd6d2434d878a5081a5db2d26bc

  • SHA256

    1c055c4009a511b4a02e98f2aa72dcb84ff8088ca33ed49a7e01c90044d9349d

  • SHA512

    a357519ec0d1a77c46cab8fea722e3cb6a3a3b978f6e9f66d0b562fcd3c329f2fb543c99a96616be618b6b75360b2837aea99a36eb84dea6e8e199d60513aea2

  • SSDEEP

    12288:MBe0KFUYaUdbYNcGn1GwIOVribDtszLnR7s:MAAUdMNH1GaV66zL1s

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c29b6abf62592fc73f4f07e24f8f7b87.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c29b6abf62592fc73f4f07e24f8f7b87.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.facebook.com/driomatrix
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    2fa58e2129e72c5e2cbd18ce0c8bc090

    SHA1

    67d2097a4b0ba9f41ddec47c5f442befe9017fb9

    SHA256

    487c4993a9d2548ab6e444d5e9788145c42e77b9064ab2578a328ae24cbf9f34

    SHA512

    e92ae90e2e09f021e88335e2337996b52422d1e6e71c020e60e9723da04f9eabec07d4098b4269cb4a123573dad0eed46d57b949243798b5db7e402f1ed71476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81cd9db6459f17bc5ce4a6d95f7b4cda

    SHA1

    5844d3333e5600dfcd8fa5b4e32a5abf28419671

    SHA256

    5a0e983609e482917929d54e21266ca79fb99300dcd9c609bf27d0a5225ef517

    SHA512

    050f32b4988b715e096f26ac8c502ff8dfc11c710ce621dcc0cb3cb0be22008496a37488378fa93022141ce4b299a128584c60ba47008626642693ffd17155d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dda7a6af1c378f8879965c93bfb4228c

    SHA1

    9abae5d4302a58ffeda802a895011db5ca359844

    SHA256

    fe8c7e1a1cb833e563124b5bc595ab3a00cbd86778e7e9d89a552b9348d73732

    SHA512

    a687c1fc6ee421e0559e7c5f9fbd3e87449c8b38f3c9086793e16eeb45588dc1ae62c06097afb7e65ac4f0800c89b831a1283befc3c8d45ef5a678668c42aa9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4056cdd2be4d1434525d93607d95a689

    SHA1

    de1c990d8eb30f260a088b7b8638242091f9b471

    SHA256

    531024b0b3e19c544f27db72a785fc1b4944db3d68a472f34e792dd2e928340c

    SHA512

    74b3a2efdb8fb012a34613a8ac5c6cf4e933ecf30ae1dc13e2a372eac5143e82f31788bcb851e121381d7ee1b528d3b907e38d7d74a24f2ff453c46ad8be1f59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    149ff04b543d904818dc8cb77738ff87

    SHA1

    5f03d57475d08e8162742b59a0b3aafa6efe4c5c

    SHA256

    2b9ae7aec3d0f5d05281e2a21e88284d03b3937672938f0fb6578410776c5ace

    SHA512

    4f9ed14847def48afda6bec1136af95db51a3b67b9a61d009e8bf0a19b0819b145c978dabf379f4985fcaf7be55545963140f7bd661708188c965786f4702eea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00f92584bc18f39f045ae8bf222693fa

    SHA1

    ae4bd76440f4fb403a2967ec02e8c8c46cfe1a07

    SHA256

    d0b456ffc96ae86944f718ad3aac75b40bedcc7f13f9e949dc3983d124745a3e

    SHA512

    50d0ed2c9851cbe40ab9d5324a8cf48dc1537e0063d16928f5c07b7b682fa097337ab8ceddddf33aec365e61874b2ee8ab04ef931ec123c8c38a752f10ae0942

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3060918abb52e0bbaf70c1effb077dc5

    SHA1

    a6d8402a71c81f310cecce248528785390c0b5fc

    SHA256

    ba659011670e5cb12702224d9445c9fed913f83d2c239eab9aa4504653bc07b4

    SHA512

    1713c653fc3ff4089e3a3533b46bd8911baa3ddf861270686bc9c6c92d336c1b6f0fda3ec6d3022cd4a713f264b9887c36f5e6e01a5d8d8eb7c7e77855b0903c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52ae47583f6f0b06cf39a394dfdfd12e

    SHA1

    7411d5442cf27192fad33a9a2eaa1695598fd45a

    SHA256

    a1b4f58ff803de36d4f928e1cecd0ce951935f1d1a4082adbb165744941eac2f

    SHA512

    8ef568ff072fb91bb41cba9f00ddbf2b90f0629aaf40aee07913919d206b606e33bbaeb2f93e9fd9a2f4895b171b6de1040fabf2f48be821fc3d78f109071964

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b04a02a93b41c8a412071513626ae12

    SHA1

    020fe3598bfe22cfe72310ab0fda4d0886a902d1

    SHA256

    2baf7f1413301e667d34c25ac526c85d7de9917ed301e856f3524eb7060ea860

    SHA512

    9fccebf1cc1530145ea216a28c45a5eda277527fae4dc6144d11e16d77c70c40cc8f37109c5e39ee9b3448997f92fe7fa34d477cd4e19486ff010a49bb0caed3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79466eda2d88ad8327e7bc037ec2736e

    SHA1

    db72ff3074903f329996bcf0d80d1cde70c88efe

    SHA256

    bb99e48811362586616a7f197a414e6aa8dd9cb7ddadbd0a0326fecd0948751a

    SHA512

    92eca12e248853f53a7fc8b11e27e026701cf1c5a75a14fbee7cde8d2830a97f0e399456a5b9e01dc5f949dc1a14112b66e845a2609c85170f0a54d3875d3e61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0db390332239b0d4d98a668b90e60947

    SHA1

    92d516ceb31b7be75dabb6c42a81552334fc74f7

    SHA256

    3da5f81101cd02b280a5a3c9e5c3d32d6c570042ccdebb99be0c30dcfe4056b4

    SHA512

    598fd87516937d4e751155ec1f934ede0a05f13a01b05601e767db5980aafe007c8c0dcb76759d21ab41c6775461e88a389fbbdd20d6fbc92fdac54745211347

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d992163a2edad24b222c035e961dc86

    SHA1

    722bef6b1e3405fd8a5a3b9ded1b3fcfcf678fe3

    SHA256

    c3ed6250a8983439b070daf45d8811a03c4daa27f7fb0f3720b018dc334c3869

    SHA512

    9ebe0c991f5f28669ccd328402a9f927e0d6625e7a53944326b6058a92fda7d411334dfd833d550f8619ff6d157f53dd7fd7c13154034a0e72b8ed3e68432479

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0f7a99733b988243164c6be92b7b2c9

    SHA1

    12851d903c0f24058bce1f72476dc88bd7fed98b

    SHA256

    2f09ffa30703c786732af6e89c8bf6e7ce179ae18f690ff22701452cedf07951

    SHA512

    9b46a5903ef677e3ad47461e472fe498e07c5605a42d9cbdec52c6c689858fddad4ab16c3c8ddadf9c0db6461a55e1b11c4c7a8e9e55a8ccf6972061cfcf95a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94328a5224c5731925de3eeaa3cb7efd

    SHA1

    29e40eb1c024b006514892ebcd84df8162d670fe

    SHA256

    d2daf0de7ea60e3263712ef1683da8b4be41fd710dadeb00e3ce01857a49b892

    SHA512

    0c1f3ba2cbf7418478f2a6e47c8a6ccd8bb609230828e602672896937a696eda64e2412be13311a75222f4d69ce3a8f00c7d48bc7046cfba0049d65829fdb214

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7325bdf3123882575c18a89970105a7b

    SHA1

    d3c5bc751793e86e7bdd9551fd7ceed915f8c3db

    SHA256

    ac17a313b4f68b1ce16f283d618cc244b9cd9cae5bb5e1055790c0313df615c4

    SHA512

    d8a9126ed62b9f87348ce1d317670802c485f3b4fc80674e35dc7ad19e13acaefdb6021addaeda8ad74290bca1def2c06cfab34cbdc4cebcf150aee4550fdcee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    c005bc8ffc7f7c9640ff4f64b7f830b5

    SHA1

    de97291a97ea42ffdd476b4c7912334281aa26e3

    SHA256

    5477f3d60dc071128441a1fc972b4316e513be0bf8cd0466eeb86f1a2484de57

    SHA512

    2bef3b55ecbed54e75c8a455d915311fd31889face18c748ee97bc5e6a5c83c82b2e27c824d3184ed1ce6908ddce2a7851fed6346aa4f744d98e031b7328bd7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s8rbov0\imagestore.dat

    Filesize

    4KB

    MD5

    4d6614c0ac95a3568b9685307eb2af6f

    SHA1

    57a652fd1b844e48162b8f313d64262fd096f56e

    SHA256

    efba9704e2073badaab6f0b8b4c639c8d0403415581d22d7ebc24b1f3f55c565

    SHA512

    6452179cad01424af7e529b64c23045525394fe28feb0bd3cef81a5c7555cfcee5d7f59ff6bc145f096f82859b29485754b9a3ca4a4b8f54c81bd077abe11004

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ZPL3X0J\hLRJ1GG_y0J[1].ico

    Filesize

    4KB

    MD5

    8cddca427dae9b925e73432f8733e05a

    SHA1

    1999a6f624a25cfd938eef6492d34fdc4f55dedc

    SHA256

    89676a3fb8639d6531c525e5800ff4cc44d06d27ff5607922d27e390eb5b6e62

    SHA512

    20fbee2886995c253e762f2bb814ad16890b0989deab4d92394363ef0060b96a634d87c380c7ba1b787a8ab312be968fed9329a729b4e0d64235a09e397db740

  • C:\Users\Admin\AppData\Local\Temp\Tar1A78.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63