Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 00:09

General

  • Target

    42a233bc767df8f7afe72f95a0758c1d93ce752451273f4c6704c91baa786750.exe

  • Size

    6.5MB

  • MD5

    b06a8127099fdee5094bf069bf556da9

  • SHA1

    6a9c3fe67afbad7bbaaffd597400c5150139cc7e

  • SHA256

    42a233bc767df8f7afe72f95a0758c1d93ce752451273f4c6704c91baa786750

  • SHA512

    2015ad2d4ec8acf8879d8d823165082aa7b22d2d62d165ebd215f873b5ef92e3f7958351e090a2693e518ab4bf5db2b25111320ecfca19aaed33d40b3d6f83e9

  • SSDEEP

    196608:djg96eU+pmutBS/DC19D2qCwS8EImIQpajJQRaG9JK78WXN:dRx+suC/O19EVBIQUdQcG9JK78WXN

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a233bc767df8f7afe72f95a0758c1d93ce752451273f4c6704c91baa786750.exe
    "C:\Users\Admin\AppData\Local\Temp\42a233bc767df8f7afe72f95a0758c1d93ce752451273f4c6704c91baa786750.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://103.91.208.221:8089/shengxin.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    31ec47604ef33757643719daf8046cfd

    SHA1

    05f7510f76da757d25c1b5255ecd355849fef7a9

    SHA256

    49e2116a2eab07f7dc49d3a500698fefbd391c40bd4ea7e44b5023faec444472

    SHA512

    d04266f9b19dd137adeb1fb1aa9b6eac3533027484b2efd76891237e3797ac88d9120f3b00d9f4d48f1c7e78497c65bd5631084b8c4c328d60ac628f37c5b413

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    093d90dd881e1f1019c1ab84751341e3

    SHA1

    6c1334de688319b0fd2c2649622d3cb198df9660

    SHA256

    e28a6e756a6fb0472e34d60ee359fd91b28e7ce12f766ea695b25d0b43b06672

    SHA512

    962b21b1bf7c49255ea8c223df2503d6dd4aa85b400cbded16f8ef32b5532dbb262dee074fcedef7491911857a7b625f375a6a6b56cb08bbdfc06178dff156af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a05d322b9e82426cd17e5a22f4300d2

    SHA1

    2cc76504eb30fdbddc01698b4199cb7db6602b41

    SHA256

    8199733bb182ab35d5ed2d60c8005667c8227f6c8372526f412867ca7e0dbe95

    SHA512

    c1a27226aaafe8bd158b8f806282492792c0e3f54b57bc931f5d6e6da733882c9af2cac452bb97f715331cde871b15b362405cdbd46c756408a425ed914dc30d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    067e706845c80763fbf6a8b7eec03dce

    SHA1

    8a6f3ad0351daa400afc83f5e6997f99d7cbab4c

    SHA256

    c5a40d002d44134d9a5b98f40865ab3516529e1c6233c24bed326d35a357d340

    SHA512

    0ac655268b28e5b06973da580afc50afac1fe183bc471ac13bd61c203b535dc3060903446812ed28110a211e30511bd08fc71873a6bdf528d8a03e3736314720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14b036f0bb539b17ffed396549b642f2

    SHA1

    53b48c40b1bb8ceeeb015cbab33eede1692944de

    SHA256

    4c4f6a3840614dea863a69e0dc06f140ae3ea7746d9662fe96ac319071b95fab

    SHA512

    17e4f60505fa067e081ddb4ae01dc9692a277e293985961b63e5af39b7edf3045c90f79cf5db8e416799083ddf6107ffbcf6a6a41856f8b30df68c2d7167dde6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67ec90d7e485f895f96bea86ec3fda14

    SHA1

    c73db77ce0aa8b41614d01f9e251a3157641750a

    SHA256

    b58a27395d5b2ac1b47fea746db6490522e146aef74fa965606b6ecb67b31922

    SHA512

    aaee51eb9848c3f5e7a7e5fff2f3509b97dd54d5e0bb00a0c91e50eb71d8f2b630183acca959e67f36dd4ddb314c10c4cf57ed2d100f0515c3c5ef99f09bde24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ba7f16f5961a9773afd9f0065083392

    SHA1

    3d4c261e52ef80dba4fae95294b102aaaeed40ea

    SHA256

    869bc92b752fa6c67ba806c503d266c9c7f6c500ba7154949d6eea0f14f0c7e4

    SHA512

    1b7db1561126c40f658070820b633c371afb2049f09b74e3491d46bdb156f36c370da6e31dd6caecbeee1528cd35bae8ae28bcd846664a7e404b418e334f34f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20a94e513ca2ecfdff8990b94c9ba7f1

    SHA1

    713b1606ee287657cd7516dbbaf56edab7e29331

    SHA256

    8a88eab9422cd76ba111d8b7b8d1c3eab5815b43b91698ed19e3116a37cae52b

    SHA512

    ec6f91642214dbe6b1386a173b6d8323b7f856cd06e9d88b97d0ad2d90d2aed089d63685c920f14b7e6d64d7ab6f8a0aaf2122faa8a8f7044a675209dbe4e82b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    685097d2f3745e46c8087d5c6ad0c792

    SHA1

    8b135f2b35ede2af1d3a96c207d379d932d6c3d7

    SHA256

    ec34134d48fab95ba3e5b9a278ff63005484ba84ef90a7e198d5bb039c21f0b2

    SHA512

    66f7a1716557cf183ace5f65f17bffa20226bbf6ef1b0982af9065c2bb09800adbaf1cde1dfa956278a0ae77be16437e7c4d25181ce261b79140d679bfa67f67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68e600b9f4c3e44ea82299b892e203b5

    SHA1

    34aa9a847cedf77f033899dcb9f4cd774b6806a0

    SHA256

    57354865799ec4fad4fbff7983453fab67db762798320b8f68068fff17cd5fbe

    SHA512

    34dd057b8deae2fa60a00100810cc4ad09d6c346640df1aae21cd32f92f631f2a86a0911ecfe7e4b5abb924e8a286cd55653bb59c524014999fdb758784e4be9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14e02b2a8919d558284b281244dec97a

    SHA1

    cb4928810c120307bbe19d479fef002db31f85d2

    SHA256

    c540c19fd353a4916959dd059d0f5d4ac35a6dd3a0722f5621e50fad307e8742

    SHA512

    4f4ef78875ff0664c85bb958c55c9504477dc77f952143089eab3dcc5aec88f917e1a28bcf3465d5d4a1560bf9a157cb6642e09f5d1688f50e73dfeb98db069d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f6fed4488e7939d16afcdc344b940cf

    SHA1

    0ee019b1adb15d683ffccd6e549152c38792722f

    SHA256

    f37729ca493fad91c32cf776289af0c3dfce582c687d1352a786f3868673bb3f

    SHA512

    42e2df4f700085bf17e0ef5bb95f3f8a3839ba65a83fd2467b3e4a9a39b5f6139d0dd4e6631ce683dee8ea72006266ae3a44f4feacedbdc07a680dbcda87fb9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfa4086a000ada891fa69a5c451dcec9

    SHA1

    c6af897d2349ed471aa66c080fbe1774e5cda958

    SHA256

    66747a399a6ec062fc2bf694ce594d497d2c6bb9ec15715ac963843e238a23dc

    SHA512

    4dcbf29070fa61a796c0c5d06db2b9a1d9c65ce235ffaa4d849dbf2bfd33ceb2045d2d0e2613e9d5c28f1d4089ce689873534cfb1fe9689d08e5aa406a5e5a2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a50f0e1148447210e0038173e4e15af5

    SHA1

    182e95d72d046dab792f28e44049a20a1c6560e2

    SHA256

    33e4571d3e105d817b6ed1c32cc74b5b63b62224d4a5c2cb2f2d2e75e766de34

    SHA512

    e90190b7fd337381f9d57c640735b77f6ed817f21e3bf31bf467a99af045ed8cd991a886d339c569b554d1586b25d8ac4446995fed74a50a26bde20173278e94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ae4815a378f1a1a1afa5ad674686616

    SHA1

    c775a97a525dfd689e9900a71bbcd7e973a22dd8

    SHA256

    adfd904f20c142b9e7bd799f9b4b96b7a8ecedd60f04d7cc5a79bc8330eb7fc3

    SHA512

    1045e7041753c27238e4320f7c9e988a7e388109b3f11131c84dde7e4ef2dfb12d8978edde12fd3bb1f933da6beedd6fcd0e470432ca2ae5f5f1c1752e97b9d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b49c0b3fc7e005e84960712c59520688

    SHA1

    8d7da2a29f4891f50f36486f60530974d597be8f

    SHA256

    09563908bca598d05afa0e4898a7c913e392c2d4dfe7bdf724636be6e421cb95

    SHA512

    b2674eeb5245f936e8c747bd2acb8a9e93800eeb2706bb58b4b403c87aaa71537395357fdcaf79124bbad3ed8015409a4eee07165b0bb94556750bfb6789740d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c3d5d1ee47bf97727edf853c0196a9c

    SHA1

    3e2c197900479ea6e53adcee350536ad44ed02f8

    SHA256

    6e360bd13cbfc928789b4541a391d5e6cbd4684d5a9e96ef07aa43d6ebc7a2ae

    SHA512

    a37388e7310dc94dca26efd2bf00ed06d4ec5c74307eb917ccca4d25fe553fa3443d16a7d22ab5718c8c0b354bf7e5ac11c129ca806a3c9ca59fa0739ea8438a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8403c2186fc0af0efdd57ff45afddae6

    SHA1

    bdcfed260a30b3eab73e71f42777b5e06e91b0c7

    SHA256

    9cfedf9f2841d7142ec4bc9eadc531bf5e769349c2759301c67d1c42b6708e45

    SHA512

    af82e70d12c8e12149b6fa34eac69c165c1397a4fb16981cb865e4acaeb7b27210752829a34e0b0621491aecee8da90980bca9cc05f9ff593f5f228a72881609

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cd97ad9c7cdd9e1442c84723691131e

    SHA1

    56cb27b49e127b863335c592e6ff751864162e7c

    SHA256

    5458a4107b63f2212876f8def9b39133db1e91899f10c6baab7d89b1d817e192

    SHA512

    b253de415c8c8469869f4becbfd63e336a5f42fde0435518086abf0d79cd0efdf8f5ff4b93f75e56e850d1c851d252f135cbebf8bf2f25ebdcf974efbb677bb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3097b6774a06f718e933f82193ccb228

    SHA1

    b9744ec73a59fbfa1f22b81593f053d589efa526

    SHA256

    6a70eb7efc9d04fa78451dfb590f85a7aeecfe67380aa20c44cfb543191f2138

    SHA512

    22be95a5f7ab3c1a54832c8fdde4ebee9630eac5091b35a7372b7e1e83a51a5fd1aeec3fa9abaac3c4396658e08f98dd5dd8447c07a969eb7ea8ffc5616a8ef4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    49fe7b9af996b2c2f5d82e06a934f525

    SHA1

    392336900407c3cad279e7b968b05fa4371f7293

    SHA256

    4fc15ec5fe76d0c1dd2e6197cc3ebd26cae0873a4b0a9cd6fbac5b1a1534811a

    SHA512

    630bbdc117447942658d2c2872a86b7a6d303c1c442493bb72a71158b65b877553580e4186c78493c8c73bfe80a41281f0f8ee5debc7462ba54c466896826c40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar1819.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\SkinH_EL.dll

    Filesize

    98KB

    MD5

    1dd2a4a0f4d21eb65db5895fca2ca489

    SHA1

    b0c0617f6f66b35e255ec9824cde41f382a60e80

    SHA256

    7a7f037bab8024a9d17fb225cc4aa04133081135ecc4be5bbb889c0fbebd7e0c

    SHA512

    214e7aa56e820ebec87a778293871672f7c4e92d06bdf5ba18a2fc536003b2e15ebdce65c1ae3c927a16fcfe865c1720a7262e7a700459c66b4ae563374518ae

  • memory/2360-14-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2360-52-0x0000000000400000-0x0000000001240000-memory.dmp

    Filesize

    14.2MB

  • memory/2360-51-0x00000000008D9000-0x0000000000BCB000-memory.dmp

    Filesize

    2.9MB

  • memory/2360-50-0x0000000000400000-0x0000000001240000-memory.dmp

    Filesize

    14.2MB

  • memory/2360-49-0x00000000031B0000-0x0000000003206000-memory.dmp

    Filesize

    344KB

  • memory/2360-48-0x0000000000400000-0x0000000001240000-memory.dmp

    Filesize

    14.2MB

  • memory/2360-44-0x0000000000400000-0x0000000001240000-memory.dmp

    Filesize

    14.2MB

  • memory/2360-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2360-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2360-4-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2360-5-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2360-7-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2360-9-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2360-12-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2360-29-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2360-17-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2360-19-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2360-22-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2360-24-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2360-27-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2360-30-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2360-32-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2360-39-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/2360-41-0x0000000000400000-0x0000000001240000-memory.dmp

    Filesize

    14.2MB

  • memory/2360-40-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2360-34-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2360-36-0x00000000008D9000-0x0000000000BCB000-memory.dmp

    Filesize

    2.9MB