Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 08:14

General

  • Target

    e13397191d23d065ebbdc1462f160482.exe

  • Size

    168KB

  • MD5

    e13397191d23d065ebbdc1462f160482

  • SHA1

    614ae7b6d61c73ac53dc9b2f2b092bfdbb3d89a6

  • SHA256

    76b39325d57a312b00bab5d139791cb41b84926699cf705d99f90911ec8ac546

  • SHA512

    be6b21c7c3f0677a3b16f5d6391e290a8e6c6351cf57536a4050fbbd8e623db806e0606838a0ae5e258a5b70924a1221ea947d5aa3e0e6b0206de9528e677cbe

  • SSDEEP

    3072:0h9apB653YItHDhppc1fxEcyGHS0OXDyiLSqALc8:0h9apB65BKTnyXnGt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e13397191d23d065ebbdc1462f160482.exe
    "C:\Users\Admin\AppData\Local\Temp\e13397191d23d065ebbdc1462f160482.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\e13397191d23d065ebbdc1462f160482.exe
      "C:\Users\Admin\AppData\Local\Temp\e13397191d23d065ebbdc1462f160482.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Users\Admin\AppData\Roaming\Dytctf.exe
        "C:\Users\Admin\AppData\Roaming\Dytctf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Users\Admin\AppData\Roaming\Dytctf.exe
          "C:\Users\Admin\AppData\Roaming\Dytctf.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2428
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2632
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    85e0f35b937326e61966e3434b39902f

    SHA1

    d16d5d27659dc444c97633c5a1e60053bcd2eb82

    SHA256

    1c36e91eac8e6bf4e9bb0d623fffeaf27758827920cf9db6d182f306a4c5b5f6

    SHA512

    f4f1e13fc0e0dee14ab63537ee7bacef9986198f938f9e44df5eb9631762bbf24700bfcfd34539c7c97bf6f989876bf422d936bf7509bfd8aa1e8fa2322cdfcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd6ee4a492523b22b755cd1793c8e532

    SHA1

    73e4497e8452196c45df5f74756798f0e739bc74

    SHA256

    5fd47c57814a1dce42bfb074186f098c606763ee4eb054a330630aa778431d8c

    SHA512

    ac7315b575298847d0b42578227465e5c35c75f84bba5e47d54f21ac5ceef6a16f97706b9f740b2106d8496205c577e650f73e085772d7cd1cb60c90bf149bf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a55eb892830d7f4926cde5f7a9ab205f

    SHA1

    f407e39e9086f05774df95fed93439ed35596358

    SHA256

    f5143fa1003bce194792a7c06d5ce6e30286076516c364ade4e9c3169d9dfeaf

    SHA512

    b85e4a23a33291d72d3cfb79a788b1f6bd4dd94300f15a8a787418b65da1afa983adca57aa7cf77bf7a7368f3783c9ae84d6b6e995a8a13a8fa71efa7e778996

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce1b643048f476741bee8101ff28101d

    SHA1

    b00cd5d99a606f79665295c5fa137f18c1de85e2

    SHA256

    8e62d8db749f0fe47a57d5ff0eae7c80ea80a83f7db582a8e957cf125b1012d4

    SHA512

    d4cfea515ecaf19c45bdd82f0f2b402eaac98943973baceeb693f80bb9e58dc2be1eb04441f356d5db514525cd053df1e205ded2dc72fc04cdf8e5d7e8a42d0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a755721db8d7307c3b36565e329e032

    SHA1

    8ba1a75dfc429daa8ae98c3886bf345391ee02d9

    SHA256

    39d8153d16f29eba76f87a89cdb208723cb2df2c9dfd32d459cfa36fbe7aa1c6

    SHA512

    45404c8e8b90bec655d376c7c6d8759de7ca57ccfcb47d9e8b01fa0c46225133500f1de2dc9113a75f405f2fda1efba3f314caf9605588ce69b94fa376f95acf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbffdecba3c561c4b7ab663cb1c50df3

    SHA1

    9a453319047a17a80a88b3e189971089aeefc665

    SHA256

    16d0a419ad3e276ef9ac4fd87c070b39665640828c19e559f0bb8c6221ea71f6

    SHA512

    87da07cfbf3195f55439bc4b6c974bd14d557729b822f7b765971c888c47a7711e0aa10ac1e158b0740290a87545073c3ba5c44b7780c105f6e73fe5e8e55e3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0278a0491478a863850e76b653768b68

    SHA1

    58fd32771f92028754423ce91f7500d7c0b0ff4f

    SHA256

    bb8b2d46eda8fd03c8b9ca4c7c5f93a7d5e55eaca14a88f2c72a347db728194c

    SHA512

    b797490ff1893fc38d574143c8aef4a046393238335438fb3890263aa3ff6e359b76b4b41502bc806c75a412e0102bd9b06d08f0d9eb86217f30a4b0fe2e25b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20bd22e1e4042f50712cf5e7a3b29003

    SHA1

    c655479bc693beb874977564515ebbceb51d33b7

    SHA256

    eb501c4cf9b462371d59abaff2a602c00b20a911392379b0bc55abca57e32a35

    SHA512

    6a69dd743d7d627c2c0053b25b09c803a1f5c34ea8d3dfe3bd313e692e7479d3eceec0087cdc7c4db5ab27adda004abbc607763f305b83a60d93477469cfdcdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef0e52c4f871e05d0daf38f2f0a9295a

    SHA1

    811cb5f418d26efee41ad3ce52b6cd2993ffb345

    SHA256

    6f22a29cb13159102e425b1319894d94abbcf657c56b5d28d98cd75c0e4d445c

    SHA512

    de52869214e1ab390b79c8bfc03409bf6b7b6f1c29beaefb7e2f25f0520e10a090296982c6d2d348396bcab40fc9a83e5fe21a972b9d4c1af347509647c5faf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dde8fc0ffccf7243c2a1926f109af301

    SHA1

    876fa4262f22de454690bce865f4f8b439c175b6

    SHA256

    fee4aaeeba5101a69459ac6572658d3b3096fa6b938705ac386f64b05106dcb8

    SHA512

    fe620a12116fdc406e07cddd6326e81cff838730c6a1530b94efa005fafc45a717e97704a7012adb21d8c325d71a7347f8ba63a91b26a35111ebee8e324f18d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d132fcf4dbbbb0060072c45a4876a181

    SHA1

    91055e481b7c7528f113ae42d0030d97a893702e

    SHA256

    8d0d249a6a7f877125ee3aea2251aaadfc579c7d6af40b15828ed03f2df160c8

    SHA512

    4c9d28c592d1c098dca5bd54d69043e1fb0b05eca4cea0c9e08c6370e27a908debca3afe75097ad933d31fefa01516aa3689e0da030ad5aed783465097e15272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67ffe9c335b9357ef580f7eaedac98c3

    SHA1

    ac10cf524e0cab5f0876a014981d88d282920f0e

    SHA256

    8a71c12fa81887d99bbd3f5fb116686a3b68d18d3f1c5c6adeff1ba0a2c25795

    SHA512

    3c8205842235994d21a21c7192436d65fd0b8a65df794d111eea935529aa5d142317f3181245ef8bc4e5bfe799e08b0223c333e10c2ac1fc30a5e78675e7c215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7dc34bd9ab70aa09ffa63622f4ece7c5

    SHA1

    8666c7ead8cf570c29cf3e09b63922fe9a8a48ad

    SHA256

    d5bb760d37bccca178d99aef7304db164b8c94b383b3193d6c76bcb32f8b78b3

    SHA512

    0bbe9f32f35be3d12fa1edc811a0bcd663ef55646501e792a065f9e2a329398dc468cdebe68fbc3743ecc0438d7171d1b70ba8233fc27c9d417457d523378d97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3537880f88b84005b3a984e648ac4742

    SHA1

    018ecd2348515fec6963c042286a5644344f18c0

    SHA256

    4cf69f41972860cbacd256731de7c891bf5ffc39adfe0f6592c8d30c504c0f52

    SHA512

    d1c94f57b3a1e87040966aa5bfbfdc30a6f72122cbc5f3db9e5b75ef21b0fec611fe42c3e45a3f1f5564db761a6cfb8afecb702b95f63941043b0324b7b6811e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb5c90631a703b9f341e968ee8c7d3cf

    SHA1

    2d143b519306579cd61998b0a95b0cfa69cd20b5

    SHA256

    972d5c479fed8a854ebba6d02b831d32524809d5b591dd3f4bd69cecdce4bf63

    SHA512

    f4199ae81e4847c9977f106caee0544607f45c11df767fba42a4f5d917298870b1393079473c9897d9de08960151958be61b652a27d6752c85cc7468f49fb3fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cba2d0e46636e6a86244899f637f2189

    SHA1

    0707b0dad808856167e8293e89e3f06c38a86146

    SHA256

    3957dcd243e35143c2bfb28281aba44952d012705f2af13c26881f28f9b7f1c6

    SHA512

    e99e5a8e63366e2c1f32453b3422d31d1f71c05cfa514305017e88cf19f906e4ad872c9fcf0581aae7e9bedffcfe3408173df897488a2b4cea8c0969dc938123

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ef4d1c11e1a54afec5ecb43b656b06f

    SHA1

    71782010e920448dae65c2627354567c3e35e07e

    SHA256

    fcb486e74aaa09dfc22e2f53328d786c44700d3422faa8228b87c8857757672e

    SHA512

    f385fb1ac585e8bbdea6fdc58c068b3f6ae10e72d6e0569dcd29df27f87e4744287327100edce3bf03eed7ec56b4e37ea095f7cbab507e0102185a53355f5fa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2bcdb8580c1556eed494306110d8906e

    SHA1

    c18c8de45dda1f956a81df765276e6cbc8364a5b

    SHA256

    e7575926e293492a5751afb10a8f587c9eeadeb35b0bf8db1094feffb842fab2

    SHA512

    c6f7b55c767f2c56e245ad16e6e39213d0141ef065da2fc04be9914c9f2eafd94d2be86867462119b7f0ff01fb2f81ee491214f2e80a557607207199d0c91adf

  • C:\Users\Admin\AppData\Local\Temp\CabC45B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarCE22.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Roaming\Dytctf.exe

    Filesize

    168KB

    MD5

    e13397191d23d065ebbdc1462f160482

    SHA1

    614ae7b6d61c73ac53dc9b2f2b092bfdbb3d89a6

    SHA256

    76b39325d57a312b00bab5d139791cb41b84926699cf705d99f90911ec8ac546

    SHA512

    be6b21c7c3f0677a3b16f5d6391e290a8e6c6351cf57536a4050fbbd8e623db806e0606838a0ae5e258a5b70924a1221ea947d5aa3e0e6b0206de9528e677cbe

  • memory/2280-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2280-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2280-24-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2592-45-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2592-44-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB