Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/08/2024, 18:55

240802-xkzn9a1bkg 3

Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 18:55

General

  • Target

    Release/System.Numerics.Vectors.xml

  • Size

    179KB

  • MD5

    95dd29ca17b63843ad787d3bc9c8c933

  • SHA1

    1a937009a92b034edb168cfac0ec1c353be8f58e

  • SHA256

    ae2c3de9ad57d7091d9f44dcdee3f88eccf2ba7cb43adc9bb24769154a532dc7

  • SHA512

    8e9397816d3435ccf79f1bf07b482473a7dd3b570bce003639f2e9fa1c5fe31c4b9400b68f191a36251a59c0253ef9e09039fdd63ba2205d379b3c582e603499

  • SSDEEP

    1536:azQgQfMzpKGPqMGFY3lF8YzA2HrYJtJZJ9JaGf4AscoqrbuC4BqaiaIacasa7c1E:azafMDl4LfX3MIg+QDB

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\System.Numerics.Vectors.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:772 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f37e04dc7b4b917dde6ada5f93d05e10

    SHA1

    1f6fea4bba0657d83b9091ce28a552b6fc19d3a0

    SHA256

    b0c212d0c83541dafc40e23884bcacab70f69e21784059760928f8560500990d

    SHA512

    24143ece1779c4b66991e96f0444a663e29a263c522fb8febe2261234c131c49d81d961f298ab34ab8f7dc696ab82d2ef0b0dc4916d750ea88bf1811b3efa11a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc3965486afdac649618b8af891d0e48

    SHA1

    4bd3481ae638fd32a2ab71b9329061b923bbc68f

    SHA256

    7b70a23b9ac16ec1a5a583babd6072bcdf7af79496b2b2759bb642bc4df5038e

    SHA512

    fbdad91a6a73e8baa3fbe42c431fab91abe654a0f58333b5d4e172053c96aeb714874bd7f45676a1ff39108d37b2936387ea4c31d461de9549fc18d64ba1c891

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df558f4081094bb90ffc686491806861

    SHA1

    8f0c2cebc1d7f69379817baf998ee211f1ff3a8e

    SHA256

    69aaacb63c6aa3182647076a6401d5ac636421c0708b29fc48dc694f43aded8e

    SHA512

    df7dfb7ae5cccf213b0b41080a2b8d7f40b8fe9f89de45626275ff5d7fa851a7c41c6547ae1a3a1f64db08297b3b21d480914ef0bbcff5ece35f4477ecc15690

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d2dbda6a2c27d4121bf7017fe969452

    SHA1

    e8f555de6da32a9eca9df8f142b62befd79f46df

    SHA256

    4e99f02106aa1eb83bd33302e762a03c8c4318840cb02750c927054a93fe300b

    SHA512

    3ce9b676e9823992b96ae00a3abaa83808bed863c5988b91ad1e219ced5f86011103dbc4d9d70e2c07dfaf80d12b2f9f8dcd17370024dfde9758d352785b6333

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63d40b321076ba1f95830d6e82571b74

    SHA1

    dd3c3af7f368794fb397e9b022fbaba8dee7cf15

    SHA256

    9c17932fdd2dbb8642a12e5f6c64068938cc9bf6c268abb7ab9da3947f5d59b2

    SHA512

    61b34a6d725f2915a0189ccb2d37853410ccf532a5d8ba5e14f62124034587419aa1f0c487b52492f3b549a7ea14e3a124f0e28ea8b50de4eda9cb29f0ca6abd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d1c5677a9d6033984a17d1f338be4d4

    SHA1

    2655acc44e118082d3ed9c4f5de8c1c3b1d3a7ef

    SHA256

    89c36056524e23ca992431ea816982b84a7e595f105c8f07f09931e3e05f1034

    SHA512

    f7a8772f472d3f6d70f88816edd27e7355b0a817c079318d056ac3dcb34d8df2660ed58ad35a85000f972cda062e12d24441dad91bcc54c3190f192f944e5b00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e332baec2a4819fcd4eeddb140834ef5

    SHA1

    d8bd970dfb487f986196a7ebe7eb73762030d985

    SHA256

    d94a85f33836983708a2ef28ea2545aa5f593c38601e1008185abe589d716dfe

    SHA512

    d53c44bfa3bb5a38cb73ea27d3ab0779d883dc6c9dc5dbe1d5069ee79d6103f2783a2336d28c4a34ca62ee6a6ea61a68055a21bd956c9aa3fad7d420fb147158

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ad190cf1c270d56a45fd5b98b5e083a

    SHA1

    19d0c6c9f256c8bf23cf627cfc46225ff09d1b10

    SHA256

    3ac009143906cca692ecc75a6a6711eec6de2608bf182422efa6a18c8bb57af3

    SHA512

    719095bb71fca0565db849501bca9d2bf12a169a0c8dd51d2677932981d822f6f85e3a523678d78c5acfd219930fbdc81bb1a19cc6548b11ec29197cab466067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1988284492be18f8e018315376cf51f

    SHA1

    bafbe557c8803323a78914243fce82e0148810d0

    SHA256

    209d2c8960ba1b5422e76e0a9ea37e3b42b947e81e03782e155b651f76e04ee6

    SHA512

    fd73c0073142bf0e9ceb34062d29e5d7af43db0a2eebedf7471d88ca493d570718a24225bc7a293d7bd4db92958adfe425700511c2d40f24e9d98069b09ccc34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66629294ee82f2d6c2adff86f7263094

    SHA1

    86d1983bcecc2d04b73b4ddce663dbd7e06e337a

    SHA256

    0a343627c17c9f5981c3c8d5b6fabb7b886da84790d721f5fa136d75da83de5c

    SHA512

    66aa92d13f0abdef864ecd932298b87047574d038568de226ac7f78e44b1f4ab0bb451c96855c7f224b0fefec3a6506c524b818779ff59128cb1c09a73cb356c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1d23807c052d2537d6b6a714bde5274

    SHA1

    e95229e8430599ce265848329f13c04e3c206750

    SHA256

    5c6816001d234a89e6119a53f582f23e7045e1b27669d98a8c4abecdce545f09

    SHA512

    b17c6af402629a083df8df2b90e46e890c10fc0a8f27eec9acdd2c3e663d44e3104b484f3bcdeb14ed469f244d9b1559a6532b89866f241641e5f9695f9b7dbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9472b658325d29ad4502f27acb35631

    SHA1

    fd7add80c76c57236fecb3c23a8245c447d3d8a0

    SHA256

    d62824482e2807b80a601e70cc8bf0e2a09066027466d5b70d1e4ac5bf240be1

    SHA512

    c89a93d3c0e5cb7aa6d3217a4db60b2719a211ff905fd2321af9ce01b31b5dee9f6c1e260b1baed6ea41c93eb02837923d538e905764952858b87802e46d0f70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ff51a9df1b39b9a06efddab3515a4b8

    SHA1

    9fa2f6308e5433611173afbd66daf908ad78894b

    SHA256

    9a2c3adc27aa657be0be66c189c3434491d5d4270d5b361aecb81da67607b21c

    SHA512

    83b3ca3fa8bb9f36787872ea026bcd5658883aef1fe06abf48c9e4433c276aba13712c8f1c97947cad05cc80cc9b5e62e52adbca4102e1098082829246dd6e75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6e9d2b98fbd2a052acbc9d880a60240

    SHA1

    5609b2e31ac113e90826c37b95b1c040774406c7

    SHA256

    ada01874b44c4ce93ef80aa6ca6c40df34db2830aa02c246d01ed34781e56b15

    SHA512

    98211e39264f3a798dd99c9b553c8bdabbd61bf1686aafa4114f7410af5b898e081744f2183a4f8dee6e13d88c61d1e55fc751c7b30a87122d9008ef4239c4d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83b34955e439ba0b2153b8dff3843154

    SHA1

    b99c5e1728478630a54a5594f21ceba277a8cf52

    SHA256

    ee0aa2c191a619e9ce87eb53d292f13f6f9ff75d5fb541e45ed0241ad9d2eb04

    SHA512

    5a8e0a07776744e5522d24189244b45cee17ca5d703ecc08b3c06cf8a2f4454dc83a284bd44a3fc13ff88151a0101262c00f336149199b43dddb3804eaf1c6e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    333ea3ca5626731ce69e866a2c992ffd

    SHA1

    af3b72c3ba4930fb42972bf6d5c67ffdae47ad43

    SHA256

    2e109ef212702cc568b2d063ae55ce08a73304fc074514087db246a5fc8be012

    SHA512

    2eda0fc95e995b98e021e53b1df1f28222dec10c66012f51484a28edd2b947e39988b4220c05ea70b990d391f8aed74d9d9722e7e151b3463d291e25b4775565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8096a32dc873e2d8da0c20af9c270f2a

    SHA1

    d94522a6ac08c36eb00b822d5ddc3cbaee52a009

    SHA256

    743893aac8ae3cf2a9cb21c2b5267812935fbec2e64d2a3dcfe4788987d80cc7

    SHA512

    f3f64cebeb44a8c176ff9f41d6e44aae8844c82b7bb76f58237121a2bd24edc6f3d6ef81cfab10158bf1a9a750a98ae7b667ac5715740f362f68f3dcc1d26669

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ce006b2dfdeb48bf4c824e6ca2e9c21

    SHA1

    7061062ae371c8694088d767525dfb6b9452bb5b

    SHA256

    1de618c929a4c2c602c70bae44d70c0ce872de60a68addb84b6090d24da317a1

    SHA512

    c1f1d825125e29729fd668d79f7a8787a60a054625c2a06bd5d580b0c3f4124d75c575379a9abd9cf17e6f21167013e1ab7c01dc461801fb8323e45322454b1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aa6940f02c7d800e3de50d2e04d2a2a

    SHA1

    2777fabe71efacd2d6f0b837a7287ee1424fe58f

    SHA256

    468f18361f25f62928b27a840a432ab0d71e82d94cc339ce003f3ca9b701838b

    SHA512

    6751254e056bfad65863f231f902d4a65e404d61676e6d6ec29cd0cc1c17a4fc9beb201f54568434e9bf6339a5645f881cf6d96b7beaa0728c22ffa76410ab3a

  • C:\Users\Admin\AppData\Local\Temp\CabF328.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF3E6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b