Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/10/2024, 12:46

241012-pzt4ba1dmf 3

12/10/2024, 12:45

241012-pzd24avhqp 3

12/10/2024, 12:44

241012-pyyeca1dja 1

12/10/2024, 12:42

241012-pxr6ya1cme 1

05/08/2024, 23:13

240805-27gt6s1hln 6

08/07/2024, 16:42

240708-t71chsybln 3

07/07/2024, 23:47

240707-3svcdssckm 10

Analysis

  • max time kernel
    1562s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 16:42

General

  • Target

    REGFuck-master/RegFuck/app.xml

  • Size

    131B

  • MD5

    5887b2878224040e99e1e44787287480

  • SHA1

    ad209f33faa68e8e505e420a28e55b36c8017a2d

  • SHA256

    f815e032f40f5613d4284cb563bbb416e5c2427a867de435f9897a60948cb040

  • SHA512

    349f0ba931a784c0f90047dc6aead719cf78d86894bf0a7d1e8214542875727cbed9462dbb1bc9f89defbd817088408a9bde9e1da668c60c2767d0f6ee38b6de

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\app.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f06241564fd53bc60e7d78b2b362335

    SHA1

    0490ed431c8f5c569f61935360e67cce432b94f5

    SHA256

    d0a70a9613fee0c072b65bcec4a235e616a4aa2db0c2d4c62f0a5defc75ac52b

    SHA512

    2bdfdb58a82f5af81a67d39ca993fd88224232a20706092db7ee999a38d10f6e87388fc9efd7fb8a43f58a69fe96d0d410e9ce2008411c5c100da0cee1902f0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d91855eddb5e1a290695d68b355b4468

    SHA1

    1911d11ecc360fbe8bb61c2b7d2255bef5a47422

    SHA256

    0cd9c896bdc76a553a3ecfc8e96edce0bce5484a58fae829fe656fff9d151b19

    SHA512

    4e41d55c7365e7e10e3e42110f9d6a4cd4583c39ecf2895ba0d5f04c6fd1dcece9a061eae6b4af70abdecd6bf6cd21859da3d6a303e8ec36fe67aec764eab36e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e93d0b2262b10291917dbdac904de64f

    SHA1

    119d2d875327c05c1f5d2fe39783841c7224c96a

    SHA256

    cbd5fc1e610d26f7d6507b2f329b19a8f0054afdfabba3f2ab365fee61f13b53

    SHA512

    8518e77fcca89b02d28ef5d24aa511cef7f87426b883f1aa89c6140ad2881bad60b16c9656269ad2cabbf3c3640d087e1b7c07c3f61fd5c0b90aad0fc5b5d5fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d756ad6fee1f262d695ee298e8a8298

    SHA1

    3d853e751dbe0627db6fd2e4d2e0a489eb99a1c2

    SHA256

    ffc2a7b339b37a1520d9ae05d03b8ad0ecfc25eaa91b6b994c2b34626d29bf4a

    SHA512

    cffa1f9963cad088866b62f44e373e709a70acc277944f348be1c711a2a892b42f100b2d36ea0c4007a256d78cd13bec1cf3c6d406e4745f9f152d5235af9122

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d226e19fa09a4eea0251ba3b3e04a41a

    SHA1

    43d131ea40198f4d6a0cb779bec0fd0a2d1defa9

    SHA256

    af54cf58b10f01f8f9b068edfe35de9e76e20c5428c43c6cc21e4999937632fc

    SHA512

    7b94852e42b7fa366ad365e7f094ff486deab7ac941696ef5b87281fc7d685a2a020d3c6e813ea8f053f8156db3efbf7ed255b44762dc1d29927648aee1ab164

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a054e59fba8b0b2cf13496e3963fc64d

    SHA1

    732957c309cbd882a8685bec190b3a5b02ddb0d1

    SHA256

    4b522a2ce5cbf15038c1807e672c776c8999c4c99592a7d161e087e08aa101fa

    SHA512

    ea5f08b4f651f21bfe44e8b0d18a76500db9cea5666953470ba1d446202a52643c3d67fbe0e42a9549e38bcdab86fc21e588c36cc270a5f5879f87f38eb07a25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    528b429a5f23e3b3376b8f10d64f3147

    SHA1

    69ea6afac8facc295604695b5e9df494e06f5e26

    SHA256

    c1c13129b018c6903053259e6f610905fbcb4c9aa584e071e8191993802db106

    SHA512

    db7f980b57b57aacf5a13ef44522a994a6887be471fd5f84d6cdb718ec35c217a6f4aface47f176cde6e7956294cf7274542cbb82443f9c6dff78cca4fbfb357

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86edb461ef11854da3e8ceb731d19580

    SHA1

    ab1011a4f2f20c49a78098aa648898e1db1ac2b2

    SHA256

    50dd3d64309ce7a2c2fd65b9d5435ac2af8f6324568d1392e310a723dc7d86d1

    SHA512

    c1ff2836b536cd7569dcac3e3d18c311d19380ad16e754b879cabe9155f31140fd9d7e0de74a6419b1a40b51c132be7b27f2df078a58bc090f68d63a14be4c37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34fa2b5eecd240c13de89309e920481e

    SHA1

    06d2ec0a89e897763d650d2963f354133c522a78

    SHA256

    bcc077a894bcc26cfa6c0481d944766a20d1e818ae2b39cc59c6c938a0247e6b

    SHA512

    a129cd55fd32447935fc6c153e44ba0911ab19225ac82d878c72b3c4e624336b95d38fc7ae22399111f8b7e6cf6f1f0440707d2426681e41d9c2deb3d1e4465c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc8a400276b305b884e2352beb239277

    SHA1

    a60cc7bc02acb823f9e060420ffb70bd46c4a674

    SHA256

    121708f5f9b1ec0d4b5ad8f249b5ec40ea76a590b74ae737590422c7ed498653

    SHA512

    af3530e2e79f7a28a0d2c598b52ce060cc959cdb2a526e4816becae77e4865a285fbd25c26ebbd12ba2efaf980548d571b6ba972eac848c3b469bf30bade98ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5078bd5bb1fcd63eac353cb0b256c411

    SHA1

    dd07181aa7df549225d010aac3f60ab136055b4f

    SHA256

    e9900ca70aa0134f238512a0dbf67b771d1746168a2666f61df5107d8b134bc8

    SHA512

    a028e3e6de18776a0d19a058eb071342f87c4b09f7f25d2a794f7ca86acd85ede03e55da966b1eaf7db038e158bd222850a5e5dc16c1c05613b888b9359dc92a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a7ab6f328b0b1b7f71da337e43d88fa

    SHA1

    dd891d8e9d2abb3fbee07282a1de5819878b0b07

    SHA256

    1b37ed0478d9f4449978ff61e75b0cb57dd3b887ff33531167946424ab60253c

    SHA512

    8b78eb3a2cf0c516a0760a1008e8fa30b7d238edfa55cdb85d739002d97e0988030eb7c2b2cfaa348e81bc5ec0ee8353844860a2adf5b074a5447c5b0887ed84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    844a3ca543873008960c65796f50b0df

    SHA1

    a8a91ccb18fbdb9838084ef32d6f47e9cbc86b72

    SHA256

    f1100d6b4ad87fa78183249542e2d8c5676aff910e9ad53ccd0df9b6b8af9adf

    SHA512

    4224ed3cb66ed1087b8ec48f9910f5048fa067dd2039c4a651cdccb6d1b40a417178c9f2d284eaf54836080647292d04701d1e481f0c673229e6ad8bc09904ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e82eaf0b2c1c3914fff2c0d776ec958

    SHA1

    f9b71b2de764df479d82b176f77e792a7dc87f3a

    SHA256

    817cc596efc1c04a91b5a5e5bc543cce75fc59e9c33ec49b5f4989d7e30eea06

    SHA512

    33caccb8105f44a0770246437fb26addb30c8a7acf0b94e90382e2c8cca6110af60ef027c677738ab5adfcb96570385933f88095f26104753f7c5a2edd04f452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d09adc81cf7946be3eb2641d563b425

    SHA1

    84bdb47ae7ba96bc122a81d3dd2351b8d15ca36d

    SHA256

    654b2ca19a1d16f1a5f413b5f03979d4e2ed3c58096e3534c2d261e2a76b2430

    SHA512

    bd655560a323492342ec48879b48238855efd5e7a451411544a442a0d4dd6deab04fddbde0a3e39d1a6d535783dcabd9c6dc2b643b6d6b56e38314339a93c705

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53794db94f37b867f5434d71a29d9629

    SHA1

    c090cb9aa11b4626e42b04985a7d97c10228e8a5

    SHA256

    3ae2556cd5323be2d056f70efcd2d471537cbc727cb87c5e02c672b26a4addf4

    SHA512

    03c5cc8de6db67346bac662a5af27eecd9e5bed59557a0d175d613f43e5099c2bf9440ca52c6aec078af9a0f1097cdbc2425d1ad13131437abccbf6ddbf14c9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffc4e41136df03b8fa05f49e2f0166d0

    SHA1

    ff49dd789df93b7cdd45023c77daaddbbe367417

    SHA256

    fd2d3bc47fd574bb190ea6407d812a525958236cfbf7d7903d9dffb273b383da

    SHA512

    ea77c6fe20d734f2cd9610f18afa33131020f532fbd394ad736b65b4b57ab4536f3c04b456d0166dc2f8955672722d405ca36957bf573ed054636e7a35220a07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21324710b4af2742c39c66ea852d55b4

    SHA1

    75b9762da6a071292412305306d8d348eabc7e9d

    SHA256

    511c1875b0609a97d92e2565337ab57e90f9e47a914efbb96690bbe0ba54ba6d

    SHA512

    afc9c5a6f6474724dd17180f2983b48ae6a451bcecb4435a27eefdc49998881d0826c90c36bcc7b5821ebbc511bc344ae0eeb31c778fcfa038128d5c38346ffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    527d831dfd9c2cb1555ae372a569e3ae

    SHA1

    a5518b07f0a37a9af4cbb940f8027be53b450c67

    SHA256

    ceb21c41a2c83b1f9f4978d3325232230406fdca8905deb969e2c764f3a7c54c

    SHA512

    625889a9c5e301a5f17f001cc5c27424060232277b3790cf2314ea5b7f15981680e93b99ec894590db358efde85b85903fddcd36edae8b725e8c0c446093a662

  • C:\Users\Admin\AppData\Local\Temp\Cab24B3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2562.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b