Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 04:41

General

  • Target

    Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/web.xml

  • Size

    231B

  • MD5

    03364272a7cfc302fef86d5c7582c392

  • SHA1

    62dd39a16767e0a876142b4b491edf7c37893841

  • SHA256

    8f8dae9330cde9d872b4787e712f548d22d622da7a993cfe9490330cbc5154c4

  • SHA512

    16dc92f94dfc950d04b6b8b29a828221f851fcc548ccc7b561f982ade8c5b4fd78f9398991b1ebb189f2386257c9e58625657ea69e3a5763055ba68d0a91bead

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Bloons.TD.5.v4.0\Bloons.TD.5.v4.0\Assets\Textures\Ultra\web.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1ef365ba234d202c8eaca75fe045c214

    SHA1

    80366bac7f084564ff4b950cf23dce01d58d2577

    SHA256

    5fb2d6571604ac1b3b3ea6184eb40cdfd10a6f26d3a9688958e8a9d25814bfa9

    SHA512

    821f1b0a0cf46793863ec128f2ab763d4b957210cd2dbdedcfef4e751abbb8e0e6bb37b3b1afe1b46f318dea58a794cfcf67208f5302f6cb8418f0f2f43289cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7cc7707a9c87bb87dde315f535d7c550

    SHA1

    152ef5e27a28f2e3ca07bf42b4ec53e26c301287

    SHA256

    785b1ddc5e26f824441a6aa7e62136dccab191ffbfc2c29c8aebbb9aa0579172

    SHA512

    1fa9e5c7d2cae60a5c97a55bc6435faee5cd52607442004937521354e5a6fc6051bde3159bccc2c845b466ebb626358b121c1ea693259d6b5cae5173356acd3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8f0cc7cc723ab43ad0da8ed7d4f55b3c

    SHA1

    ffd6826cb9ffa1de9740f59ed63d368b030d5f1c

    SHA256

    0ea980e1fa28bc1fd28bdbb7bcc0330f01c221f86d3d4b4be6a5a287d19e3360

    SHA512

    76b0f91a6b865c5114bd370035b53e1662de9110c639eb51ec8eb60b4079b7f670e74f7b43fb8613a94f183a0392c90a75f817b6e457f87ce683c0172875b317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3b1c0c8229978ef02a4a152fd4ceeeed

    SHA1

    f2245f9f9506ac4f7b55ebf440a73e629be5c669

    SHA256

    3c8979c017b21dc5cf830dd85b6070b813940ce830ee96626b6aba58218c1b8e

    SHA512

    e2caa85fe51d7e518c48e7103c74b5ad9bdb3ffc63d85aa4a04dd8a0cc8655a19d522d97338f85f5ab653879f71d302d12f65f862ae77c8a76d52ba8bf6fd94c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a5904f25453234413fa78ae153fa81bb

    SHA1

    eafb057376cfe7a49c48f251e6b603f86f85ac5c

    SHA256

    2c9fb761229fb5adaddacef8cbd5388796742dcb6dafa0968aba341dd7ec25e0

    SHA512

    6c5b2dcf7651e6d9a0b9f3510bde1e2d3c8e1ac6ecd71d8cce9af4a7dc7ba6087137c9b17ece0f4dd14d54a6b012e9761197ff119b2dbedb2113d50ee68d6022

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b62b3a150c6b52f0cc9eb9dd97d0d198

    SHA1

    494f863789128a498415197fafb1ead19e43dc0f

    SHA256

    430ff9e83184aea0e2eca78649481d947346641bacb43f70efc505235cb14561

    SHA512

    8873ef8b3782f956ac7b48baf548c516d13a0ae611917415cbb5443ca07a37f19add5612a9c79ca0c3f2ab4eca39acf83d8d682a89a00bc012cd1662bbd410f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    db44d224456ee75f178f91051fdd3309

    SHA1

    3773a67a53bec6c57819e3dc9d5a9c479595a7e4

    SHA256

    862fdf337204c98f49bf2b477f2db84c48b84ef5c2c1bcb1c72a082ae68ce9ed

    SHA512

    98d0fb61bb72c0cbc994f71c54e66eaa3c328308f09088c64736a679990509373c7637af14e3fbdea77e3cdbf678b48a919387c6d33cc4bf6317cadfc3fe24e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b2165a12be86c40904d6f953d79e752d

    SHA1

    fea464fc8055965e9f066089e71f528fe69e6f4e

    SHA256

    2293666abd306ce3cde93e1f46789abb7113c01ce472f4e344a441919b84e07f

    SHA512

    4df535c34ae790e9389c370186482aa046472940a0ceeaff55e3ee0cac7133cd10feb357faf2379a54f631e477caa5dadd67e011aa271d6004fa7be536e8b7a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    798d745d0a6c0a523d7560f5a0260325

    SHA1

    cbd1d262e70a78f56a46c3cc8aeff40202721c09

    SHA256

    356094c86a204674115f99ba8d3a01ca4a06699f0bb2374175cb7aa79067f3db

    SHA512

    ab89ca6780a871d6ec2000bb745d74d1806bab40f97c41ce31ef90e6a0522a6365cd9d239a17e304074f10f591e351e2801ef7c077fd6293bb9c06a71ff238ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e45918482d9ebc1ab7e1ded89c7c1aac

    SHA1

    fb66280420c602725831a0d7eac6573a156e59da

    SHA256

    77720733e18550a8c0c0f8cfe58bcddf66bbc42dfb8ac99a724b5d50ecbd6022

    SHA512

    1ee93a1af89012973cb6fec7d148c8ccf6e76eb44bf27c8f4396a369953641b212c10dd444bc78628f8d1ae6fb188507922dfb84095177057a36e1376775513c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    014639fc4101b265c3c144c733f65af6

    SHA1

    80db1831efcf5ce989f57a29d909e11d1a622ed9

    SHA256

    889b65386b10a5bda2d5f72ac27ea34f8be5bfc387ed36689623f415ca0c9326

    SHA512

    70e2ef7a93ee9634535bf2ce482b3b21c17daee4b6b3c92809b77ab361329f96a9cb0fb81531afa11bb696244fb79d111de0cee0db65b949e749c070f82d9f18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fecb364f56591c1b0fd3048dcd7655ab

    SHA1

    01f1b8fef90edc147ee8892c8bb3560d9f7b3b62

    SHA256

    c7c1914a1047026e105bb42ebe7e8344dcdf9c7a1d418b85b33a56d635ab3031

    SHA512

    6be228184982c18ee9d3abe8e4ddfaa5237224c919c270a43fcd3510d6abcc8cbcccfbf8610fbde00692e66528894244dcf4ac59077a01454324ad05c57b28b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6add689c5d73853d08259bca9efed643

    SHA1

    d66803f59d4fed615116ca8c9ca626c5170cb81d

    SHA256

    418eaa04daf3be52e47d6350bf168a672eae0f23b61b87717502f573d51526e6

    SHA512

    275b0e5473fa7f816c4b6f8d39b7079a6360176a3ff6869eff0e6e738632ff21d650c7153fe64208cd93c50daef89edbb8cb5171cd7c75ca2cbaeb4a7563f84d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5da3102a328222705885a9b0f8b66954

    SHA1

    d51e8438fca7a40d7c43ddc3d0f9b544f397893a

    SHA256

    dd8d5fba00e8da532c170c705d89ddfcb564a9190aa090a4fbfb8bf8d64fef7f

    SHA512

    88171e69f557e8fce88e464bbe4a3a099b871ddd6d99ca23d99b1da99aa4ad05088c4515d0a2d9e609c7189feec13791271f357e3fd32f0893f5b710a445aa1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4acca5ce17edae067c009aa688e213a6

    SHA1

    eca01f3c9b8843e8b26cc85ba7bd7667ad54706e

    SHA256

    eaacb22fa9d5b19ba82a2a1d14e3ddad6cd990df9fde9fa8fa7c3e38c62fce82

    SHA512

    21c77bf8233130c7e9b20928498bc78478ed71c10e1371b606f11cdb9698cd0da13aa9da6ed1b5fe3d0ca9e2cae97e0b6c5fdcf2728da083cdb56b90e8f515dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8be2cd74452ec9f8df7e7abba728e999

    SHA1

    53d43d666e2394eb73753e77cf93d6f39213c834

    SHA256

    8198da784567f3faf3893b81a21ca846c6fe242fb0a37161253588e1ffb5cbf1

    SHA512

    d77886d3498b519495b39467a7d06795215c2b4f3127c8eacc446c3b974a407794574f5910407dfcdf0413dd6ec464216fbf33707941c961d4df94feb29da4fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c32c93a94bfd79741a3c039655c3e4ac

    SHA1

    1aa434c9dd7d88b9cb349cb37df4de6988f9fcad

    SHA256

    69f8fe02830b33e3f20cc19589f7e56a3fea8813e8c9b2783b800258a62b92ce

    SHA512

    88b06581aad3f92fe3bb18f2a7fb456ea6594495b9ed874ba7a27f59cb9c21ca842b09e89105a7c073a9403168098fbf2454b3734d4a84f98fc16c03e1873694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    27ca5adb2b14e21631575f831e2fb126

    SHA1

    7f32f54397047210184bfd4bb4ba92f4e153edbe

    SHA256

    ba66c5c826f3c064c6358098286001dea0a69a9456425a0a46ae250e26ad3ce5

    SHA512

    cc3bd64e5b8d7d15b8928823ed416180aa89aff9559cd91072532186500d736b41a9c59b00d93bb5376981ef6f54250ebeb28548a5a9f31c510dc9358872fb3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9b7e167f4f21012af50785d593083b3e

    SHA1

    767dcbf78979d29da05ed24b0ecab08905287a17

    SHA256

    5873e0e991617e61c2d5c2ddde4bf42abbdc694e520a0c5a04f1a73e9a2d473a

    SHA512

    88880b635d01b514d6187b0b95d232520909be98b901a10f2f4a4d3d6afce3614b2f96646cd899a6165154fc0695ac49b84da5a85c3891e9e9a110b4f1a29569

  • C:\Users\Admin\AppData\Local\Temp\Cab4C11.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4CC0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b