Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/07/2024, 15:26

240726-sveplszckf 10

26/07/2024, 15:22

240726-sr1snszbjd 5

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 15:22

General

  • Target

    022-CITACION DEMANDA EN SU CONTRA -JUZGADO LABORAL 04 CIRCUITO ESPECIALIZADO EXTINXION-02.svg

  • Size

    365KB

  • MD5

    80193d67d0da94a9d928fe4bc5b3a7cc

  • SHA1

    ec3b1f52e184dd87dfe9ceb2eb5cdca6f96f5dc4

  • SHA256

    6e6577761b13f6a42f212419a8fcca10f35ab9315f24e9be39c8fc5cdfcfea10

  • SHA512

    b376e9152c6ec0b45d8e9fa7d4f298a8ddf2d873c3b42b3f7d60704dbef3c7a4967a6e32fef5cd8fa0019bd6176401c2b8fcc0698437c2ae8082bfacb9088957

  • SSDEEP

    3072:RCkLBpCoMXyV1d/Cl+XlwdgrJGwS4BHKlgeJtonukwUwPsWw5wzwQw6qmPwOhuqZ:RfBpCoK21dE+XlpJGwSsKldhLsuCY

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\022-CITACION DEMANDA EN SU CONTRA -JUZGADO LABORAL 04 CIRCUITO ESPECIALIZADO EXTINXION-02.svg"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4676 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4676 CREDAT:17414 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    3657335e6a16bf2e31605028126baadb

    SHA1

    e5d5a1fb18511ebcb49494570a94b92527540114

    SHA256

    433b51bbdd8a72ef859d9e4bc11030dd61b20e78db25fda3780d5ae8fe706548

    SHA512

    29b6d77cb3850711312b6578dc8f647018c1e7ea7ff1a375f55563dd69395d03a960d11e6a83d77c0a93695440fb1c3522cfbd4c957e6e06c82c9e8650785848

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    70a8219ba9a1cb7b04f3a137a932b5d4

    SHA1

    04db2677a8d906bb9efbe5600a6cf6d06fde182d

    SHA256

    8e3e8c84593b5a4a515a06c5ff338f0d334a57261ee6d421d2941d6322099421

    SHA512

    f0163c48d730dff10a1cf5e4ffdf2399f32c505385ede87d9a5e0b822dfc7a52ac05ec772bacc71bdf7b097a9a71dd2759b62c5458aa313660e0bd9cea27433f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cf5rogt\imagestore.dat

    Filesize

    13KB

    MD5

    5c27a58ad6fb80198bc63e95d4ad7fd4

    SHA1

    1f8eaeb9db6c3839d5f3a1bde910b87a0064de2c

    SHA256

    240efc68d17b3dfc29beaa63c05c7eefaac40c87007f9b6826d03a3ae04ba6bf

    SHA512

    b3ded0b24eb9ad353d5c07ddeea5745cbc46d62178ffb224609c2bb667b18d3f183d9fe7da1596d0ebe8e761569b3d49eda2d2eacde68fad1bafbb81cd690331

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cf5rogt\imagestore.dat

    Filesize

    5KB

    MD5

    42dff1749d869a985e7cb05abd3fe9b8

    SHA1

    104ed6568f5c875679e87257580971a637b3f702

    SHA256

    d9fa5ec615dea5eda5a9d07c0387e047c4efa9ce870e6c7e480a5ea1754ca8d5

    SHA512

    0af97e0474a4f35b21b64e6e66537adb1c18b85f197f2234d57c9524cc503eb54a3e53d89af0446e38191bdc784cd9c15a3c0f021f483d1db3240507c9600830

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3WWFCFW4\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LO59P0R8\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YFAWXPEZ\favicon[1].png

    Filesize

    7KB

    MD5

    9e3fe8db4c9f34d785a3064c7123a480

    SHA1

    0f77f9aa982c19665c642fa9b56b9b20c44983b6

    SHA256

    4d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9

    SHA512

    20d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1