Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 04:41

General

  • Target

    Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/z_factor.xml

  • Size

    241B

  • MD5

    aba467d6951f6f9fbdaf2d379183cf7a

  • SHA1

    7ef1b7dd34297ce47deb38a24cda309b5a19eae5

  • SHA256

    fe4f5efb82a9e390383355458577de5a37efb71a4de4972deeb5fd875066355b

  • SHA512

    f156d611ae7910050b92fe40e3b89106df08fb4c3f4a17da69d3e3087bb1c3cdcfaedd3686efd21e96192cdacffd68456e17c2ff792c1cab1332a1d0d809cf68

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Bloons.TD.5.v4.0\Bloons.TD.5.v4.0\Assets\Textures\Ultra\z_factor.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    951f391a8cb728b71d9e4f92b77937c5

    SHA1

    79c10b0f0492b38eba3ad534516d6d7c3331bf50

    SHA256

    105fab7a8b499b509ae02f3c20df243c16b83fb43fc9545b8759cfd45059a753

    SHA512

    5af6a7198df8edbcd9082cb898225698d6a1692a5aca43e51eabae61157a09ceefc8294dd7d0064d11818cfed9f0c5e352d4153462e1a25c5494e5633cda4694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1d61d96f0097260029a7c5c81cd6652

    SHA1

    975d07db91301e9daf1edd78534f83ec6f3b462d

    SHA256

    bfa1d1f0c8568c587574953359503a6e3890aac051e164c7089da7409366857c

    SHA512

    159bf49b9cbb4e7a72d22e40b2ea95cfe2a7a00430e52520af4de23403faac85ecd923ac5562f96512462db9afb798133a2dc579c8e49289640311416df3fc95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04ad66ab7530483ef72c4b39b83e0e16

    SHA1

    49859c402043d1802fe37a1b6513d6e2d15d2c6a

    SHA256

    42f24be0bdd40cad033c63ceff6206bb256735b02252e69da72927be9295ee75

    SHA512

    9403d2c48308ee5f188e66637e7003def973202ffa59913bb9b092df8c3830686a3204ddcea12fa4c1cff4bb465d90032aec90c5feec5c83ce252cf36a3b2c4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36d4902b0e44163ed3a97bbe3eb40da5

    SHA1

    83021de6751daef67df0ce8b1884210c12bb7615

    SHA256

    f0bbace3b42fe7688e21f9e75d1896521dd7e196c2d2698bb6864bd7d9c34592

    SHA512

    383cd3d80d2591c21cbecc2bb5a1db62806ea3049f8800984249126fe719abde7311e5c6e45bdeb9b3aafdfba106fc9e6f3e25b6ffdbecbb7ec219d28447b052

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b63cd7e5ed91bed0e508d11a25f4149c

    SHA1

    d45bf7462eaf48228dae64d78b7d78c01c9ebb16

    SHA256

    9ab077a0781284d4e0baa26348bb26758525e42197d72b5baa12778b742be93c

    SHA512

    7e0cf72701f18a995579154b14a1c910d76fc530ad62f1388856afedd1134ce2a2a6099e3a417c875df717b83999c86c5298bc98b823555f11c18b95647f420d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    463ccd74df8db43219c1b94b746d4f01

    SHA1

    3d662bd76fa2db24a01737c36528d0c93906b91f

    SHA256

    4a174ae8a81e78bd9dac05a34283916d4d8d5640aa03effbf0c0f3589188ba2c

    SHA512

    7fca4d843e0457bf5e96a13e724a227159034ed8760810535128857f16ebab8c77eea264d6699e9c8e98b5799234e1d7e0d6207f00bfb51c7cbdad65fc77c65a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02ac7e2eed5bd2a262ce6722985ae7a0

    SHA1

    537fc112c58f372d798381ad53598363d224c078

    SHA256

    0137e2ceff528ae4128ae01fe1fb6a5f1de36c6178d6f5db8752ccd3c77b103f

    SHA512

    21481d943c00b8ee81f28af1670f082ef15b82c12a83c7eb04ce261bd23275f11cf45f7266baa0d18c395765f65098c856053b73ce32a92e5c74546abd17bc7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    068e6565c4f47dc72c5a71ca79045501

    SHA1

    cc370b43b66a983432f4e41f2008cf3e115eebd1

    SHA256

    6c403d0bd5018952d1ffb1df9d310fe59f6f84858239c49f560d19d5e44b1638

    SHA512

    3ec03e7e71a2a671e296702bf563aa4976bc16ab2b8d9a466ad7b9e473a3dc5cde67df263f810488f81d399c9be7075ddf4135bea0586572fa5643a3f5c98730

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adcac7a659f72f2a66661c2dc0271f8c

    SHA1

    f7a74aaa97696417c0736eb6d32c6b7e0311ca92

    SHA256

    934601626cfa9ca7379cdfa4f220e4f8b2fd5427658bd14c87157289be5ce4c0

    SHA512

    3419f227753a737ff840df985142033d97c190fa302230ea0123d19564dd4cdaf678b53ff8b14a241a918ad0930bdd517b4508a4d1fe92a3aa7b92eb8b4e66df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fda1064282cfecd944b7be757808def

    SHA1

    2af5f563d4605b2160a07788fd522e846b33f30b

    SHA256

    2ef59d31a0d97508ab551d94581c2d22907ddb5cc9e64f2688a83478f72efee6

    SHA512

    ac303bc8f1e941e8c13af1daa6a6d5ea1bba19f0c257d95c20ffbf5f977f321a0294cbc3abe07236dd5381c56ced7624030cf17cf36ba13d917ed43618c83d1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c10996b293072b6b8f51708ae3b7a43a

    SHA1

    0aa22b4aa1d8fa9380c9f0239b81c01bab6c7695

    SHA256

    3e36513ba482c20009eb25b6a621b791d0a21d3e4336a06cea73fb0e8c9087d5

    SHA512

    0fe340138891caff937ec23f035909b545c64684b7584158d9b8104acd9414cbb3663d5e2b93b1e60df8e6139c2a30bdc306300b87f2fbfb0c1480ed9febf8a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fc0ea3dda9b662ff9f514964a156870

    SHA1

    57fa7393a72bc6c7f9556a67d912f47aba3a3cc2

    SHA256

    68d1b6d595e97cb68365df287eac1f15db640ce422f337d9567855199d3cf1a6

    SHA512

    d8da2a02e4d4974f836bbdd6b540443392e594b3b1298ed96f688c902fba9f96a847d0083694030b9dae9653b68291c82ef3d338ceaa787811f68f06c0f6509f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b95634b24181c0c03b72154109aab61f

    SHA1

    42014cf08e4971fd1503d346445340d798b7d2ee

    SHA256

    5ec4a8c59ebe209afe6bcf772b082c0b1c4faae284057db87fdfceaf2ddea839

    SHA512

    e46cbe52546cb6337c9dfd5e1a3c86113a0ff0a25a720df0e00ff2260b90b82e4a22002da1fd552ef2c85d5288313f4079e1cfb283863914f947880576f81891

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfb598d78a631794f208a6b440267949

    SHA1

    a9a4f40c4bf0d065b83e5ab4c9b38887212d4470

    SHA256

    c3c9ebb90eff8bd20896bcebaeb99ebe4e3ceb4a2371956f0a17c82403b9ed8e

    SHA512

    2f39436db4049e45df89e32370836c3f59cbbf2bf0da29809abfca0e18f24f086c97dcf41776a1fd844ee104160ecb37ba586adc69d731c3a322e85e3878be36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97941be5febab93bf24d288886c6ec2f

    SHA1

    e02c367780d1e1404c3a58d593b186d4a15d34b6

    SHA256

    fd5ad9d46732ec887e4c28fd222710b774c176db7afcada1fc842a6fe754a860

    SHA512

    13b41e127c26df94e68da6badca402707b0a0704a4e3a1d9d9fe10d8d084f5cb156f49a9138ae193069e4801dbaa9021df367582bb85baf996ba86057724c664

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d66637a661586ead9f33ff71a4d1c3e

    SHA1

    ba8d2bd8cae04a716e72af2e52c8080dc2395fb9

    SHA256

    f616a9a57af50b5e9d45ff8b18d0ca6f4092030aecd43df803c0bfaf27144e76

    SHA512

    2dc2a2afbf3f91fe4cab8ca687ce5563671b638f6a4c3dc5e3b475a62a4770eacbb4d71737b409faeed73193202ee9b6b6e37b49a28fb07b0338a254a18dec08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2333998995e8b0abe6962ca5a2f286b7

    SHA1

    43195830e0a8fb8cfa7206f86a6670c52be42621

    SHA256

    5fc27d0f2acd8d81d32f9477b48bfc9442f8eae3eb55f3a83634a5a462d498a4

    SHA512

    49c7275709c46df1a7fe77b004b92ec2b09b39c47ca17c091435eb20217d7a05a4fa9a5a5c522fbe49c1d2a1cf9b2d3cae49aaf434c934c4507c5f957218797d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    426b7744855f62bc95bd9cba39419307

    SHA1

    670146660c81ef8e23aa75aa79ad2dd91aa2a0e0

    SHA256

    a014817366c50987309b89e7bb8f7f537be0fb909b7c66b81d722610c4a06574

    SHA512

    b60b77b4c49e6193efd56138bc663c23662e8b556a7d658dde7bc7633271cf290773ecfa495562f648cbf5a3e13cb42a17b95fac6c784efb7e4338817995f670

  • C:\Users\Admin\AppData\Local\Temp\Cab2205.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar22B5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b