Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/08/2024, 18:55

240802-xkzn9a1bkg 3

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 18:55

General

  • Target

    Release/System.Text.Encoding.CodePages.xml

  • Size

    2KB

  • MD5

    c1bed46594fd83112d7e77050eb0e874

  • SHA1

    cc5c4d051678e7de0ffe9d7354556f421699c04a

  • SHA256

    2aa6e789fa4827267fcf178cadc9f1eb9772e45fb6d8a1fa631343e221b2c5bc

  • SHA512

    b616a7782e297b70b063413cb103cfbcff7a5dda8e074937232650ac7ab05dbd6fcd541b203ea639e75eeb6dfd24e6ecbac2fc9038505e15d738e018ab9e765c

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\System.Text.Encoding.CodePages.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b0b160b588e6037b520784ec395a465

    SHA1

    f936d0f6464fb473b9df5b85d9e1f062555683aa

    SHA256

    ce4987720091a63c58e5d21e60981364217e8f83331f77f4bf5622e2532ff2f1

    SHA512

    7ee1c305c12ade1ed00c67f9716e196486fa050d7b3f94172a5903668e24db6cd0d09950f5d8491d50437e85dd597d0b76c29c65c64770f65d16fbb005428cf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8addde344c5b6e20c018d28950cc2bc

    SHA1

    4119d6bd02f79c0d6fc46224ce3e9ce78174c850

    SHA256

    39c9c60077c5b8a1ce54e3e4c81f93a99117e71d3f8ba5d183f9c957a756918a

    SHA512

    28eeeaa91876329de00fac4b2e0b92e28823bebf6e0d369bb03ee3637aefb5df5ec68aac23ca59c8ea22aa164db8a7c679656cb60efe78f98b92d09d1aa90b4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e3feadad649454e9d8ee73cae83983f

    SHA1

    eb0fc5191320a81236f071ca123560ba94af5c2b

    SHA256

    f657410d23aebb83808d7c3de5ace4865710eebc8d58a03430876c365a0bcc95

    SHA512

    fc1996184c09351b6de128da8943f7a123b8a312335ca9519254b3107f41dcd9a46459f917d9e79de49931772df769b165003ffa73fa4a1020734e726b14498f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af088c0f1de025c5dd3dc7c7fabfc00b

    SHA1

    52a6946c01cb16d2ecaab671bc6ffecc7acb5d83

    SHA256

    d574f84e0ba575c164e41e318057591ceee44c3e4ca941aa1592662cc9507453

    SHA512

    1541dc9e2b21b64a6d905818078a84c38946e36336947b8762fd7d3d2e12e9efbb24fd4a213d06cec699f41615338395f110754bd8b4cc7fd82e2ad32d414067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0796d904de13c6d0d4218b8262d82ce0

    SHA1

    d704c9244ce34efad84a98b936f9ea82bc434073

    SHA256

    6be913f161d4786575baa7aa583793709b41eabbbad463ddd57f941d2ffa363d

    SHA512

    a00ee2e88174d7a55e2066f3544e72441ed5775083994d8b6268639f358f741aef1b867f7a1d58cc445d1eef201248ea4e24ae696d8bad56684a3f12a93a0f1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbbc0dc65ea434e4bf0283ae79ef6f40

    SHA1

    a8e8d9522dddb7b71b6d3cf420d6b890aa2fa53c

    SHA256

    ed73890ae34dfcf93bdcaf4a98f2ad1bb50ee83322f4f17a1108c5458d6b78bb

    SHA512

    a95e3eaf23af8057a63daedbb59c93714a64f8727ee064de6963ec804077c1d978e9057f1f54bea725400c8aa139a89c4063ee1eec2d018e98f4507d51fef05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2dad1087bb9e224f181f201150203b37

    SHA1

    b49094cff65bda84fa60292d13a4b9eaae712083

    SHA256

    acc067c6e537a2ae1119d69b2d6389cd0c15dc6420496b0d751006f865aa682a

    SHA512

    1edb93f2a15cbcddebccbccddbfd04c26344742803d3910a707e7edaaceca33d00df6db12bc03a80d9980a8d718b8ddc5e36b1cb0821f85291542bc0e21e6fd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b68b68579222af0dd4a9a046a743fb87

    SHA1

    acc8651d5067b3619486772f553478f07a771647

    SHA256

    6f487198d7528a822873ecfa691abc27d93605fcb1073e51dad01a2b5ead9253

    SHA512

    0b4ba4319290c7d4ff7c102e93424769fb41210da69f0c6782a461ce3957eadbd248834058954feae4d6ed96068fe74537f190bf8c05df7e3c8b72bcfb3d3afb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00ae70d3ce2268f6c71141b72f42f180

    SHA1

    38a5032aaa60fff3a1025fa4cbff4ecadad95301

    SHA256

    0497fbfe3029500b0693d9d717c40cc5a4fce6e0c0a6b454b8a11158638a9bdc

    SHA512

    88e1b21f880f2eaec1a8bb2a85fdc661f162cab77d8a5026ef8e132dd34b75e3e0411c2756ff455fb761be7978bb11dc77e8a54c184db175801ff27ed5198744

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a6c52d7508912d8193b7a01b2522cae

    SHA1

    4c9b345d775ded0276c034e8aebf8bb127860c95

    SHA256

    988f51579628a7bba630d6f0a0d49b1b62a81d4f39c3dfc28844160e9f590cbd

    SHA512

    e6407c21242c9e0b94ee4f590711048b5927aa46ce791e557455f30ab6668728c81333c14105d7c1410b9c6d25d18a18c90901d099e3e11c44a1aad600202909

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fad6012d4c72ea38fb18abd20508c435

    SHA1

    ab428b264cc3755ccdaf245946ce3a9a80c4cd8c

    SHA256

    bdef49177dfbea5f8460f95ae11a828096871cbe55e6315b740ae29c5110267d

    SHA512

    f08a273f1dab45654ef5022440c2c823097a91e63d78fa4d1f29902c1438cd34ee0fa8fefc1f6f31da1cbb62ae234ee9fc192cf5ce38be3847a2355c4119054c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab5a53ea1d34930c8a42d99cc19b0a6b

    SHA1

    6e1e518ec51f4136b5c8eadf38ccbe34c66d0442

    SHA256

    a3d4876c57a37ff2546589f1823e86d4833507c3326a5eb1adf7f5141948f969

    SHA512

    64133bb55f4a732e2af793954cdba7780a23ae467c72804d22e00b2278d4371ebdb330f7a4ef49cd6d73ac76b997ab5eaa1b1e43fd80deb3a93785794ff193d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8dc6dd8c4f8eba0bdb6a63883c64af5

    SHA1

    602b9c076071ca3fddc144dd6bd2b5dd37918ef5

    SHA256

    455709096ef389a236dcc76d09d729fc1b36b2e90d8bdab8a8b15f1f961b4d0c

    SHA512

    ed61c911a2baf77a9ddd5d1eac0ab7a807ea246a2eac4af7b0931479509cf6bcd9f5fa43a83283bbe541aaec3b358f3372c228544e0d5b673ff4addb366f17fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d59b5dadb7416e85474fa4ddbcf5a50e

    SHA1

    5e34a5620417c7d38651c521040c7eabdf122ab2

    SHA256

    af662dc00c5014d9d3eddc6633f5a3e2e22020c6a1d0ba80c2fb343e0e47ac2a

    SHA512

    128e158e91ac8e9b5b7fea692faca93da541357e75116f0b9deaf71f5ba01103db128c7b21ca67f4b8c20a9b2a2e5356821940fb7644618ef5bfc4a043d29aee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71090ed09fd22ba67358d167fe6801a8

    SHA1

    2610e39d5d57fdbf68a8030baa205b196ea86bee

    SHA256

    c5c4f88e82d14fa7a7e5300be121457ba00dc8c96b55c3a98fb4f115f2583dde

    SHA512

    7bfe6101e30e558502fa139ea118855e8a44ecfc7bad60175b56e5bf8386c4cccd822600c3ba8ffa660b1e49c25243b223bceb703493abcf199d02b555237d95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    beedb06d699c63de91a7d187922cec88

    SHA1

    cf477966a35f417c2a6e2f382dd1e7928c1645c0

    SHA256

    a20489d5aa688d7b2b73f627d997ab82945966155f69afddff6fdd3e47e22bbc

    SHA512

    5236981156b41ea0d25cfeee36669910c9d106a4c0b5c8cdc8628efaea121c08e87492f37a813453607c4a6026d3f9c2027a62553ccf12e233d886d8b8c3b96f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c316f81ff26c071a7ff2ac59ac38f95a

    SHA1

    b1bfb5c18fe99331350d66f208a65b82bd609cfd

    SHA256

    ed0155d9f553b2500548b6762d9e82ff2f8d531a0f15f89ae21113e2dcb07712

    SHA512

    3ab56a4c77866ddfdc6ab426d0363f9c0a6e4a16ff526cf2ecba05708fe361703f671cbd14853920ebd14f5afea4d8c85019cdaf3ee63fd42846b14ec8f03305

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1516e9ce6139ceb2f106520b0b4d601

    SHA1

    4a3a7f2effd04b7614255c0779d45025edf45922

    SHA256

    c76e86c7dc66d1c161ea16a385abc85eb555a714dd96bdb10f4c83c53f757ae3

    SHA512

    b23e18fe2d4a949e623e7328154be884ae3ee36526d27186a36ea167f8861c2666cb65fb03a3731e46a0305b13c372f1f9d12526a40e07ffab12ddb441c4a4bc

  • C:\Users\Admin\AppData\Local\Temp\Cab2D79.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2DDA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b