Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    97s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 10:49

General

  • Target

    Mensajes en cuarentena.zip

  • Size

    47KB

  • MD5

    2066edf6fd707c23f9c300f7cc81d0c1

  • SHA1

    80f00b8cc5f4c9743883c8a5907d26971e24f709

  • SHA256

    6e49dea1b5da74ed697595d44389e28de1b2ca65114d2592f9ddf139dff9611f

  • SHA512

    a04d60b592bf3504a23a8c622161e985059908cf7f37133e48db3f32830db8c99cc3a520d91256559fae8391f6a9ffa29fb944b780083f8a3aeed9c5581a2a36

  • SSDEEP

    768:tOlDwQrC65sNP4vBPAGapPhLBigZobBnjgbO1Pw3GyeMvgqjAW4lQpMB7eCdUR:tGDBr9mN59ygGbNjgboPEGFMSW4iMBSv

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Mensajes en cuarentena.zip"
    1⤵
      PID:3056
    • C:\Windows\system32\verclsid.exe
      "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
      1⤵
        PID:2728
      • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
        "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\Admin\Desktop\Mensajes en cuarentena\0e65e448-695d-43e8-f2f6-08dc7bd45911\9de7aa69-141c-c04c-6190-7cd62fe888c4.eml"
        1⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://ebay.onelink.me/TAsm?pid=Email&c=CM_Incentives_App-only_program&Country=UK&af_web_dp=https://share-eu1.hsforms.com/1awuDpROcT-apSF9dzARx0Q2e6czz
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2440
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:2
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

        Filesize

        893B

        MD5

        d4ae187b4574036c2d76b6df8a8c1a30

        SHA1

        b06f409fa14bab33cbaf4a37811b8740b624d9e5

        SHA256

        a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

        SHA512

        1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        60979ec639a7e941b115cb8aa8eafde2

        SHA1

        48fa3f1b0bb314d48208368413e4f08d671378b0

        SHA256

        539c033fc33db05d7ff113eaaba30b3db4e4eeccde6f81dd10ae43378e026f85

        SHA512

        8f368e9f90d463cd9eeced6c502ee6b87251f391453d1d6eea1f2310265308098d157e0dacc99d8dcf14d6981f2ffed81a91ff14a6be65fe24f3cfdaea45863c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        6c5a4a050663d2a3aac3c2b23f4a0c30

        SHA1

        89dfcc506f0bd7c9e5ab55a46fed2a304a78ea3b

        SHA256

        e5479f6a2a6ff577bd526d94e96cef95f3d252e2542537f32f670f59c461310a

        SHA512

        c3bc00315b5345568ca8b4dd565e789ef0018f4d0d22ee7d2fc75a16a279864e850080d526dcd805bfbb47072d06643999432bc0ce59c5149feb4dcdc9913cf4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        7419d08d1407ad7d2c6e6b9c34a39b73

        SHA1

        87c0db8bb663c302351d45b22cf97697b77f20a8

        SHA256

        b4fef7ab404d1ba3adcbc4499fd02b140bd3bbfe403c0435b3ae5ef5f544220e

        SHA512

        fb0bef6b2b8ee5b8bdbdccd23f676501e89fb540e2808526e46843ae02656f3ad2d05310d9c96d2980efa731d906512ffb8ffbf2a5e0b6dbcd003ed11610a0a7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        8695c18850c87b1d4e0e9e39d7179a6a

        SHA1

        dc354fc942726cd56c72cd87ca0bcbd39d44ba27

        SHA256

        62aed12147d5f799ac89678880b3e953765a16c280b0eef6c802ad87d09fae1d

        SHA512

        de64075a84eae9490afdcd3cd14cdc8affce2954a7522434c0600b2b16af5134d6b94b6161a46712364d38575085c1e6ea21b1534830054ea7b1668b0802d504

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        7e1d5c94d654c62cb339e05223522af8

        SHA1

        1e583a3cfb99a2520dd0447af7bd0bade680512d

        SHA256

        9544215a108ec5fc451d027149e717eec3c8576f11460abb9f3f01fd82add951

        SHA512

        0d76d057642b1a1663f3be79c97376809b21add43d6df7faae1cb47124ab0b903d5a3e56bcd2b6190addf34dd015a063ba579a93fdc5e258e75d5e0aa436c4a9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        a3e860fc391aa0debaee5447790b2312

        SHA1

        fd4f2464369fdf13621275c77ddae7b12ec98551

        SHA256

        a2f7f69e5f2071431f8f2f566afc06561957156e28ff429e72055ba02c216c47

        SHA512

        ebf8ed03c77abc6fd962f0e4d9db08a0c752128963716233b238e1ad1a61434ae7ed0d8c9d30e46253b9b844db453908dc4d831293625fcb0d20ebc4fd847d77

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        706fb5385c1dcb7264ac997491f9c3a6

        SHA1

        d25c27c4b40d6ecdcd4f94ae92ad722d0b44c72e

        SHA256

        c046475619d3eca215ffe0ab335b22161dfdb449cdce09fcafc84a588f928ee3

        SHA512

        9ea5a97b7374625c7b5a5fd7b6b051c17f7e4f268761cd5006b1405e9e42a0c88cad49ea6be853a585485da0b9069605c4b0c43e7a001e0fd4ad26844b6c92bd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        0d6ab2114de8f71f83525c2b0b1de460

        SHA1

        37486d8e8587b179fb07050895c1538afc2d328f

        SHA256

        d5377837e17fa3be1aa78d5f8311b6354db9fcf40561615a839c5a07bd777e52

        SHA512

        38fe397207fa4a973bb918df75312154550175a6329982f0910c55dc9df04eaf58f958bdf373c05e9977d383eee2d340f6cad0e3684bc85bcbc0992fe6fb5972

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        afb30fd82ed59e3add4c7ecb36f0cbc5

        SHA1

        0ab0ff6155436cb1014377134af0aee4335aefe0

        SHA256

        6e1826c1bdd14cfee7890c3dd2ec0d6ce3664296e2f86ab9c0376bc804fd75c3

        SHA512

        d73ecd9712644c630da4f05ab4ab34e781ed6f94d3c8cfdd5406c4a1a87986b9250837a0215528d04309501748d37164775197d27808e9ffe1edfaf24452000f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        74e9906c153d1e877c287f383bc65d2d

        SHA1

        33b995008f37c77b5848d0c6ca922a7c8a934b3a

        SHA256

        228651126237b51488dfa879f8743341690d851e7af0ce530fdd7c1cd1cb129f

        SHA512

        df0d98095f7291e595a4076f11aea6fe0343b03cda26c8b9e76cf57203b1af0ebea885bf17a529a74f88f7aaf551fb34ff0db2b903f61ff356b04a60771bf733

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        9f4517875b3bba92a1be7d9aae2e4503

        SHA1

        14d8c6da441fe2ccf02e4ba473519f5df0c2d5da

        SHA256

        6b7a7d9a49f7ed70f4d9694ce592006a2e14fe3463a73b89e92e0b92fe2ff5cd

        SHA512

        c83363d70746ec6565a7c422b9728296781700b90627a866a00ad6dd0da3df5dbb37c14945f1a67f1ea458ea524d9798132e7798f8a7d87f921aa663db77aa9d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        1e92931842bd1dd2676b3fd706e8a20d

        SHA1

        5b70c3c57b2aae4d7ea17743e0778bb0280f6dd6

        SHA256

        8c2be58c9f40fb1bc667b17225c500afad69a24074e262584cc0669b57850e0a

        SHA512

        eab96c2f959f512a236e6031c5d30ff5dc4cdd2bcfa794ebf85542f2b365b59bfdf721a6619642f61f8233523817daab7e80eb7b6d04ae970abcec4b136d2dda

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        683ee4b81c973618ed2824b5c40cf5c6

        SHA1

        609e553370b8e8d87b7672992bcaa36b0163083e

        SHA256

        8cc0e7bcc30864371993306c41639a4fbfe753b0d1843a5445ce50bd4ff2bb5e

        SHA512

        7a8946063509422e40a845cfbb00008bfc7bd6f9541ac8a6b23f00d9a85b72fa4621c185155b913bdd903061d3c7b5dc3f488ab1c071ba602b4148af1d88adc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        aabd9e66a7d458408b76298b195d7cf8

        SHA1

        5e0720c6824e1b5b086325b02de9e81e14d2db63

        SHA256

        4f90353b64d1fbc56314c479ed7ae4567b3ba0a918ec169563b813164aec830c

        SHA512

        214f1ab6e1e73cfef93482cf228c5aa79ebbb47763b8d095bdef69b2f13aea66512f5bab85f565be54b64379da884ebfdfe827684a151769c6761130a75c3bd3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        30a9fa1a118cb258663108cea4862c55

        SHA1

        d4d374d58fc69f92abe3bf2e790d91019bf01fa2

        SHA256

        b37a2706aaf9aca6d9b0bc09074d0aba2016f2d16e19520959bc944eb1dcfa74

        SHA512

        5b8efe039440867e6377774f2ef139952bed834ad13dc9420f1019efe547f414896e064f57bc0113e0d8b74c55a3928807dbb6d4c5f76298183a2c7d0bb758fa

      • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

        Filesize

        248KB

        MD5

        8a1d9bc9c64ffd54aea5bc0a0f35270f

        SHA1

        c15c31c17912c706aa090772e8df677769bd24a2

        SHA256

        89f4cef485345df14d0ed6fefce730616b67689386964903a9251663d21d9977

        SHA512

        54ad6b67d0ea53effcb788b49a6ea50a818ff4c4518a93a5c15616e9d356d7c6d761022014730dfb0ba6925dc392e2e30853d1665c6f096c1fdb2a06a1b6abeb

      • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

        Filesize

        230KB

        MD5

        6cf4189ea93de7fd6cecc9148b0f55e1

        SHA1

        b312f7bba96a16b123820604763484ada1c33231

        SHA256

        cbf664e1ffccdde9815bd5580d2850bbf3abc208df4d09a897009b88ef79127a

        SHA512

        8ff0286b874474bdc399dbb5641b247ca1db607214888c99c572a8805b4e8943b08a0b9faf40d832e76de7c025238ef79f9a3399d9a0cf3790c0c6f2ab249648

      • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

        Filesize

        226KB

        MD5

        7af51633dd64797a862c42a6ffbf5058

        SHA1

        4f4c308c25c9f05f2495567e0254df84b44428a6

        SHA256

        00f502270471efe58b2b62bab8692f9c1064d0cfcd9a5b76dfb606ff20a907c4

        SHA512

        15320faf17dd7adfee6457754dd14939cf1238f70d5cc56fd5f53ff105164e720ec251867fb26985f4d6a85d29bfdb441a91e2bc8ab4a13ac7d9d2e0781a918e

      • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

        Filesize

        240KB

        MD5

        b2dba2a49f01ee4b06f57bad6b5338f2

        SHA1

        a26876cf9ad29f25644fabe43fe8d497921297e0

        SHA256

        f1f6317fc0c3c6bf9c81d1f73afbafdc4b4250112e80378da73fb9ee00fcef9a

        SHA512

        6fe466a395cd4f39ca7667ba77fd903609c38fd58e3090715ecb998b40af462c933fc5974932411e3c3c7c2d1185820774633e364359ba64cb46ea264baa8a7f

      • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

        Filesize

        1KB

        MD5

        48dd6cae43ce26b992c35799fcd76898

        SHA1

        8e600544df0250da7d634599ce6ee50da11c0355

        SHA256

        7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

        SHA512

        c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\favicon[1].htm

        Filesize

        12KB

        MD5

        afcc142f936530677adf7ee0add58ff9

        SHA1

        fa617bd4851c9b2d0bdb60a0b04fa78d705b0404

        SHA256

        31991337caa72127a95526ff2c3b640aeccbb5ecfe67c91c400f2d3ab1dcaf2f

        SHA512

        b14aced3417812ce2697380b3f130b4c98c7511da23b33588274923852d9b125fb9a078944df0861f83013f856adf475df44de9afb4abf2c95665d87ef6b5899

      • C:\Users\Admin\AppData\Local\Temp\Cab714B.tmp

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\Tar715E.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\{D7C8D10A-C3AD-4B2F-85E7-88DEED76D57A}.html

        Filesize

        6KB

        MD5

        adf3db405fe75820ba7ddc92dc3c54fb

        SHA1

        af664360e136fd5af829fd7f297eb493a2928d60

        SHA256

        4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

        SHA512

        69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/1192-193-0x000000007360D000-0x0000000073618000-memory.dmp

        Filesize

        44KB

      • memory/1192-1-0x000000007360D000-0x0000000073618000-memory.dmp

        Filesize

        44KB

      • memory/1192-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB