Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 17:49

General

  • Target

    ₳DÐ✵SetUp✓/ObjectDock.exe.xml

  • Size

    292B

  • MD5

    d2a735f9f8b0a9eaee60cfdfe8c3fe91

  • SHA1

    48a2d80fd6606c4e1e3a9715a8a3f2d394f33bd4

  • SHA256

    020330f57fc1bf60c9639ca8eae9ee142ad44d44e847290d1ee959ab6758985f

  • SHA512

    b6e7131352b37d37756bf8b15aadb50d22c19b2e4cfc0a716f5cd1ad162109da8d55f183bdb2537b9fc43a7bd5d7c74599c63f411ff7b9ef681da10745b7faae

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\₳DÐ✵SetUp✓\ObjectDock.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e571b71a01f37b4f94aea364b2c192b4

    SHA1

    7a8390d6c178305215d482a96ca05bffbf44f526

    SHA256

    d9ca47dc5f3214219c864cb5df2a299efb1954e4f6880217e3497e3aed0321ee

    SHA512

    36d67dcd1a2451f0cf07d81f09e6641148bfe29ebae6577c23b433e0223179b2a8f5332c0924a0a3e4eea12bd3e09bff0342817ae2fb1c9eafb2c5b5aaa0b818

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50ca2c5812a8863441f67737c89f3198

    SHA1

    aa6ea69338147c9ddc22d93e32adfbbb5034b686

    SHA256

    afe7011a90d95d0060472cdc4b9d5dff3a872e4850e357b966b3354f663044ea

    SHA512

    f52d0639f14348270340d6a5fc1a3da920097664148fb60442e6be61cd87ba078b45a5521d49f2d6d16a92ce9606f620dbe129670dd9bced368ad6720a250fda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c007a65edf6a07627da8e4bbf0eb4e0

    SHA1

    65f5a674af8e89d975e430012118756c95ab2c9b

    SHA256

    322e387bc689d6875bd1bf08289992b33a1d57ba36188b8482f81c06d50c0c17

    SHA512

    1ea049f9132ddd0f02a4c3413de53c8ccfcb48327423e3469acf97ea53e95414158d0324efaaac1acb300ddfe6cb8abb498081b5d5f081432ff2735488312960

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9961175ca96a8f1e320a87f700e90c40

    SHA1

    3cdbe70b1debd76f8b1744efa41f15d95c68ad5b

    SHA256

    c84f47e8e1b2fdaecbf3a42ecaf021e8bc2e23dbdd0bd18728eb2b309cd6a9f0

    SHA512

    27383180196895b46bbe72ad5495de057adab994abb04956631921212028e7d562d510156f471613e536a5c46259a25fcb8fc5180dd984d16a38be50c7669fb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f82bfe27cb84e32bedf39edd66e44857

    SHA1

    363e82d6e56f030077dcff9da11b78be8bd04694

    SHA256

    d35c6a54cc2eec4d50fbffeea33039a893a4f8b9cbc21147d2a6cd9d13232c42

    SHA512

    6b899b8a104512477a882980b1ee9f16a293dea840e5f41d8b3193c494fa0b2cd6f78702d4b976a510e8d04b321676e1653a31f2970f7d3b32f83a620599733e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e52b6c33ac5d514921744b5e6997cd31

    SHA1

    886c3546a608adfc977c354dcc69fb1d051b761b

    SHA256

    4d64bcf0c4a48514ae911ba0817f96bcad744159026ca018f214177b69dee7b1

    SHA512

    7a6536d234237d38d9b153964e9b5ca90b9b9a16375c145ec6cce72b34beaf39963a241537fd15936d73fee52102f7df6843e57cd935bbc9681dbc58b477fe84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccc55c0d3aac4389d39f212d4e6da7c1

    SHA1

    2996b9a4e919734b00c4fe93f7e6326ff28bff85

    SHA256

    ddf879e15f81df472d82c6ea798f472a5925f4b0b3a854aa1da987df7739b591

    SHA512

    4c3773dc62f5c72f1e6db5055eacecdbf35e2814ddaf20338454874a3a716e0cc2fe7d72fb360d93e1c467158f9fc9326546a887c7f33973b2df32d0fc1cb67a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b18d80bb085c5e9ccb8d6bcdf76a9fd

    SHA1

    ce54256a9000cfc5819e225de637157e90ebf1e8

    SHA256

    5c41f1acb638a1a04d80bce7b3a3ae52123055380f6218909d86c73b6a350f32

    SHA512

    85cc1a01d432600a7a6dcb8f39b0e92cb258c6b6050cbfb1d0cd55b0108babfeade20356a3949e7043fe73b26121e715265c42a39b7b5540606c90918a25d36a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00a971464c2483c9aa7dd77f36123f31

    SHA1

    27135c8712291fa450416bac68f4f01c708b53f4

    SHA256

    52e2587433fa0cd65b86cf8dde698daadf30c61abf8a94f4e9b06ca032cbc4e7

    SHA512

    e62e9011d673aea48e1510cf688d8e8e921cb9034d4dba15081d645f0dce35fae13be7d14724f4fc4fe876da2032d5d62f7520131919fcedeabc0f029b8c4230

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b177e131c6b5037420ec057786696dc2

    SHA1

    b1321959c9ef8a857270faf9b9a7a30dcb719683

    SHA256

    c08d82e1150967dfbeb90e8c0e1a010e7468d6b2fed5b8f46406a846f089d39b

    SHA512

    b812ed0c4fa8aca35b698d2dcba6e3a90fb7d7846a907e4b198b7be36f278cfc7efe7ef6805dd6dc7b021c7af07d7f389034c36706abc2434ce7f4ff6268eff6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    709fffa17904b93b63252796730f48e4

    SHA1

    ae3bee868b2f812a4ce31b95d41af61357c50de4

    SHA256

    1fd99d048b08bbcf05a71e13e95ff6d43c90961958bf491d394f6bc038c6a8cc

    SHA512

    c2977fac7aa1879c4e54e1740bd50af83541440ee5377648a805047cf64ba4d004a26050f1214aacaff7f36db87449f0ecb4d47e81d65fe0c574b7046cc70f3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09d5d2443ca5de8b38a91d3eaf18198d

    SHA1

    939a41eef8f4ae19de6e223005988b217494b00e

    SHA256

    735e4c33320dc248ee22e85f54d9fca0dbb8af310b3218987b4c7cd033f09fda

    SHA512

    57564c0046bcdfbe10c38863cb0440b55aa70e351e77f4eb42f286863d1d1cd945e0093ff921855e42040b4870cd63b58a65f04c57b7b23865f44b4578175faa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0276de2becd4a6bad78a6b1f35906f13

    SHA1

    fc9001613ac8ab106a163333d85a141b1aa2eb88

    SHA256

    c3b109f31fd0fe98b0d07230b9043af1eda8bda1ec4ccc28a268a8450de843a9

    SHA512

    4513d4bc575d3cbcc6e4661298387747052842f8746f0b581026d924ea8be625ebd445635dececb3a5fba14e80790a99f2edf6647345053447f6973e56eac826

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d06f5a4dfe4cbac57ac882a42b2efa61

    SHA1

    8df3f694efd3fe94194a92df669a453b2f84107b

    SHA256

    0a5b1c3bc9c68b9da9a8c4242a0e9ab0f32f6f86a9c25727ee297561e7de1c1f

    SHA512

    345069a4b930c6e4f223a64f5ab65dcc1bbe1ba46a2d8763744cb808ac9e88fa16b40a3d5f68c0f99ee956986c14162e0236b79d6ce26b2fa12fc0bb185d1982

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad07165ee5b00502b1c283872248ea9a

    SHA1

    49a6d48774d1e4faff82dd4d0cbe3c777a0f61a7

    SHA256

    045adbc7e2cc7f92515e647d617ade22f2d2bcaba2e75185bc0a776a11dfcfbb

    SHA512

    e2a889bcf8011e92a8578c41c7d7b3a760fbb1e3c175d6a3519da0ba12a51eab8f23c13376960fc513bddaec44cd52259cc646411d98b5f9699d4775c9357dfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44d93f810ac0f2dbdab64d8965a9af5d

    SHA1

    edf1e403707ad545597a689dcf0bff16a7190bf9

    SHA256

    86df15aac689b5f8f8eecf2de19bbd456607532d6f46a105f32fd3ca30efb39c

    SHA512

    b19402b6464250dff2c62ca0f6c4ad11fee4feaee425121c00229c899bd4a2b6c18596dd2fc7a2428c8a64de7f618c1b0a115aab109bc20f6ff311ef43b52ff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fb45671e7a65e4ec61bd8e944a33c2b

    SHA1

    72cce3a574c091bee4c0e55fe16757609c25285b

    SHA256

    bf78aa039a7e9b692801a76efb0c50356d032f62d336a7433b66e7fce1518563

    SHA512

    c897fbdf73f8ebeef0972b87adbb7f60a1f66ea59f133b9bde8ee8629157dd94bddf61018404510312d17973585aca04e28b9b2291c1c3b526040e2fa92afac2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1c80adfb168f659c18f7b9afb42a67b

    SHA1

    3f9e895f042f220d66c4ee44f99440ce23ad64b2

    SHA256

    3878d1088f3d12dc0321c21fb70aceb81fd0707774ddc72d02c9dcf84ec22a3e

    SHA512

    0be766c9769c2551bfc45c7bd1ec73a194a15e3c5f61ba22f7b8e8c86fd06e6858a0912616067c8bd904bc9098acc2c5d9956cdc44e0657ac66ec01b80836816

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a13fd7600cf9d42ff5ed0ffdd6bbe640

    SHA1

    a234d2dcca70c9f1f2c7c90dd5060239ad623b1c

    SHA256

    e840f6db3ed2ad659d3eeae21678155d4cbfe3090251676cf80fba2008f00b18

    SHA512

    ead2f18f4abd88349e8e9fafc82073aecd3edc231d53ad259f94da65ed39b5c8b8cc1ffb94288309b3e63d3798119746f6350c0f760b66b2ee9f9db2a3d64027

  • C:\Users\Admin\AppData\Local\Temp\Cab1D92.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1E40.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b