Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    87s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 20:54

General

  • Target

    HMC.exe

  • Size

    2.6MB

  • MD5

    0bd541037d1794d63bb58654f1e897c5

  • SHA1

    a901fc2bc1fcc672b6dfee0d3e93b4ca8f11c710

  • SHA256

    2e8931e43c5674bc641651868ef311e2d3407e0132325c0795bdf4f5404fb30f

  • SHA512

    85412b5357e65ceebdd1f460e4764e3b5b11c242250500f9f55fdbaa0d2c6aa15cf0f68f7e1d88369a013a2d16c95e235db68dd48590e306de59cf01fb7128c9

  • SSDEEP

    24576:rVsQ6BKfC+CWDU2fy6Uuri8MmOmbCYUz7PH8Zeaj0HM3ow5Xt:rVeBB2kMOnYUvPb

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HMC.exe
    "C:\Users\Admin\AppData\Local\Temp\HMC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/z5vMmkQ8pj
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    25a6485d2a05abe0c7fd70a9b92187e5

    SHA1

    f7e25bfc458d1e2eebb478257bc74f534e563720

    SHA256

    b75a8596831032b219903bd3f5fe75d4902c8efbb36d3b4ae9e1560942bbbe60

    SHA512

    819f484e51ace0b3bad66aa37842b0b41f5ded3ccd9cb775742efb36d745d779cfe671126b9261951106b637d32dd0522908d279de834855981e3456451aac3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0a4523b65bca25ab8b638f8f1291226

    SHA1

    71fd5bb883a31a224569283e0c86f0cb3eb86005

    SHA256

    9550dccc4f6a9ac0d962b16ee373ea6033d9334c22486c019a077d2780b1fcf5

    SHA512

    8a4267aaed8f84e11af0444dd34bfc9f444d0a877894450cf10fa5996e99ea46d20d9ff62d244316a855da23a59ccf4922b972f305c661c8f3b7ac4cbe5caa67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e7cb271dcbe581b38bcf749c8291aa2

    SHA1

    c11a5eb506426abebdcf37404597272ecaf4a436

    SHA256

    e2fbe0498169b33eea5bc6989d02f2c954151944df3509deaa187e88a25bc128

    SHA512

    1a9f39d29e286da8ebc69bfc99411b0d2187ba0f849a9e126bac78b2ffcc0246401c502e10c31992d897b86966ea20f8eeebe4d193eb2dbea3bdf1acd1dee392

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab28b12db58a5f7fb2cd9be088092f0b

    SHA1

    58209f30615f4369bc364c9a96dad61a2c18321b

    SHA256

    595692d63afbc3bb83d69549b570a98ec02286c5d99af285e4b38c0d1b6baf02

    SHA512

    9e63868b60478aa9f45a0e6f5d50125f55f8bbae7cf60f3f2c0e5bf394d6c7e2592fc0a33e695266a30f1792df1883adfd73172d08dddd1b46d2e93d6f6f0ec0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    070aa0fe6f150d1828cb7b68fbf29f1e

    SHA1

    a8524806675481906f94e32b825053905272c610

    SHA256

    25e69f6bcad0a6024a51de18d0e6a7cde5ac4d4517c3edbc0666cbabf6332b7e

    SHA512

    f7eea5569231af206e3c4fa0597291e690b6c6f8f406c7f1af600386012597b9a54f7983d6409de779c2a4d7c2cb9844c55b69ef2fc2d9ce00032ac0369f05b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73e5d5c57eb1de046c6b9fc51e237c9a

    SHA1

    3dbd3ca40c6178adcda1c2b45aee243ab34ae284

    SHA256

    e7f2ecb2b6034cac43e6c930c766c3dd4b77e6b88e9575be8560924c82135b4f

    SHA512

    5f854075cbbc644c14dd2fd4ef40878de0bac7a5d34178e1bb95d9eedf232bdc33c03586fa146361182cc12edd1c7cac20b6f7603840d7ec25eafb1c83a2034d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af84920c202e0084b0b389dc9906c493

    SHA1

    b29b109705e96a9dbdc2807459e5161f2e4952fe

    SHA256

    6ee3e4b3d22753fb2135b2f5bbe12919f94020f25b16cb8b0413b8c79280bf3c

    SHA512

    989fe580ddf492532a5c7e861796067c8e8a1ae80449c755a7aedf581db415f887aa320b9f26499a5c362a595e690d1f500f7094b2f04f6e861f256612b915a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    481fe00b9e6a3366f1c5742871ac10d0

    SHA1

    d1684fa4eb77e0feda10c82c3c33c886cd832266

    SHA256

    8d33998f1873c55ccc10ba0592da67d9bb756d6e1207ae068ae06bb7947a2661

    SHA512

    b117dc8bda860a06b2379673fcde3ceea9c42c626d693f084f66e1c04af113edb651e1c93a22fa093aeac786a8e1524dfb0a99a59f1c01a36f70d15161fa3376

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8ce13addce263de340725cd9c10aff8

    SHA1

    781a573893214f9f1e1ec90b245e30629bcb794e

    SHA256

    b1fba6d62e86f6ca4331b2dc8ada5ca0061660d0854e20db0b65aed50bcf1bf4

    SHA512

    80275fb239e793f077561aa2e0c0158c5b9fc794eb228bee4fc9b1aa8f19f3af1d58e5288cea3d6c21a3f776a269eef4407392bb85f3e78a6a9cd9cc156c9e30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77ad9448f052897819b32d5441aa19f2

    SHA1

    a58939fd3327f1eb481437c66722d2ca7b2d4c2b

    SHA256

    b7d9d84e5ba046fbc04591bb4860e11ecd3cbce6f95a9d1c637e3ab55e82f89d

    SHA512

    90bd42b3c501656b6b62bef7ec519b045727b736aa64e736796cdb831b9beee89c552dc6e7c71078296de94a5f81bdc7235fd3dffa43e3c764e6be6d911ddcfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c6197ab001402e474cb38169794277d

    SHA1

    d8a59ab8c928fea05275609949718f0c9494791b

    SHA256

    ae02b76304979ae78dd8314736bfd9871b711fd7a8c786d0acb6932d20a3eca5

    SHA512

    f81aa853b904f86bda96da00cb9d49361362e37aa374f705fd6288d5e28d5a9f98e2a282a67f132f7757962a2ac53782aa553f989f660215ad4f93cdb332408f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85efa1f65a2aa2d7165940e43d2fb53f

    SHA1

    475bf5ab10575f8c2d5753c99d0847f0746cf4d1

    SHA256

    98c59973aaf5e351b039874ab3a1ec52041b867ff6b0ffa28eb1dadd87f369e0

    SHA512

    022a91709bf695e5776e341a5586765b61ac4f4b269f4b3994f051d8c988ee7359d9b80691903946cc89560f8dcb857344e4f803e1cea0feb822d9e9e89b8629

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e4c9d1d52427d3aa3b794092222f991

    SHA1

    b8ab2bb8d5cb2eb74c41690c78df2b6ece4fd357

    SHA256

    252a57b007ad9de5e58bc64cf6bd22e2088449457d989634c750b6a299807bbd

    SHA512

    fb6cbeaf240ed48634e48682d572f5a5c499e638ff2be0b923177a054413a0d049d03ad59247dac1e36943dc5ee80a6898edc12b0c85ef0b048e965cc1ec7653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27c667e36b8f71f0656236cb5edd1ddd

    SHA1

    172520551fe0624b17e586ce3b599aa528507a2d

    SHA256

    15ef036a96c09f4476cc24d12b7aacb05e18eec7c5bce8449543596b452dc654

    SHA512

    fad5d00650a729903327e741ae8bc835ff0bdafc2807dea927e64c278d156c2c272e8bc1498d844bd0b5ceb61faf70e43dce73530c8ba357df333f59afa5ab65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34f955703f8b23188309c9f371100dab

    SHA1

    3c137a25b5a276f1f58534e826c25a08abbad3f6

    SHA256

    062580402a5cd686f7b913708a4a7a5851e3e0898540bb214577ad7101422601

    SHA512

    4038cbe65947e82acf726d67562c4e827ff4d59fda257d423f6f9d4f65da544681985cdddec1e8e52d5fb5e3ba517edf177d3c645f94aa8cdbe21be7f4bd38ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    141202f7370004061de14a293669db34

    SHA1

    3054c056b8ed78ba6242bc83586fcf1a21d25a0e

    SHA256

    e4da8df7cd58c3f565a9fa0c30202829318aadcf62fb0566bea64ef509326831

    SHA512

    1470f59423e4a5a2a0dd218f9d2f6d90d195a45d5ced294c74a56206153a7b1650d6b4e2f52c99f58501d1e5d0c34c59262696174fcb45d410b5e383544b4c67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36330e72ca16dc67fd9be8586cba11a0

    SHA1

    7ddf230436f1fff1298f2a8df50d59a7af125d05

    SHA256

    d6cdf59a7879a7750154f3923336666d5bf2c56eaee28294a337e516182287c4

    SHA512

    b860f6c5848bba5b3caa3d142d1c65ccc0d5be3f0c87040d364c1e129413aaef8c882472636c3546f53f8a5015238e09de0cbec11a4945a78642fa01cb0f1be5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6898851d988a40d68fe246bb2eedf042

    SHA1

    3391bdfea6eb735e875bf0e74abe1612d96eb93e

    SHA256

    c5edbd999a9e454fce2698fb7bf89664e5ea399b7a96de1698eec956da015338

    SHA512

    66b30754f001de7793eab5e9c8f6e9a97f7b45b812ce72e74c4c52e2df05364ac840ffb866b196ba82118d2a71d2566c039166e19b3ca2ff98682b5f26e46fc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbaa7cc1ff38ac543a04dcceecf204a8

    SHA1

    7cdbd4bc03ff74750c627c0eda95a2e0d266b78f

    SHA256

    0e83eab1615b477d11a3bed32f48bdcbd6aed3bc34bcbb4e00afd201d452c158

    SHA512

    d319ad6a5eda64c337175284ac95a014a4030284ab70b783adfe8612b1e06b0bd0a84b3710592341808b09a25cac88a3adf2e6128893fed96f85e65872ea3e65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2c12691302441ec78aa45558e756bf4

    SHA1

    c70c24b5aaaa4b6b6ff42e1ec523ece197f9a075

    SHA256

    e49099da153f1bad324d90eb728872cc121aeda60cc6ca17919bfb560570edcc

    SHA512

    7c442a21f23381e895ab1740599adaba81bd33fa84cfc82bcd89b96baafe9c1a017ae52f9b3c93316a91cde8a75885ded4eda516c1ed38ab1865bf08b60ca92f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    810dfb21d86e1ffda132465bb002a8ed

    SHA1

    2ac7bf1097aad1c9fc67cc5576c23b7b54218936

    SHA256

    55a656d1372c14ad6b1902fe586e15440e46e0802e162f20a81272e80fc5b164

    SHA512

    2e640534ca3238901fa0148c533036e78082989e82ee63c5f44df42b4b3a3b7fc901d98ce289ede097a79125a65212b758fb5c7a0d1664c50ec844427e015839

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fff93b1163aef9f03a5ed05d1975ec7

    SHA1

    20a566376d4d3b37e1034d1137eec31a6064924a

    SHA256

    0507cdf37f968d94e760b076cf5bb948cc0fe9a75c2617fa0dc6b6f47497cfa0

    SHA512

    9d7239b0ce390e5eacc8516597b815e31738a0bf33512f50716128af5a03514722ba8331414863a783c98d29094652153f3e410edec1f1f1ceb9d7fa864a043d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    749d9fcbcf3fa942b3d529209b7c620b

    SHA1

    de68e3a4aaf5166c2bf257e4450b7fb3732ad33e

    SHA256

    7fb2224ba9c10dfe3871a4f7513be62d270009197d4157d153354c67e4b80524

    SHA512

    8f1620bd2b24a176b5bb552b3af22a94fedf202a5fc8e6fae093ae6301b8692ddb681a225c2d4c0eff9f72daa32472bccbed9df782a03135f71f8a47b9a75219

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ljg9kkp\imagestore.dat

    Filesize

    24KB

    MD5

    af0fa9e9ad1432889d2a7c1ddc22aabc

    SHA1

    92911c94c5a9256b55cdb527e7ac5e3fa47e334a

    SHA256

    318ba673e15726f0cf05e097b4e7ee20777bd6e65269591885b86639c586234e

    SHA512

    dcd002484df64e1ca12fce40fa7c053defbfa5c157c780763daf9e2899fdfed9abee88d9f29c8d8c4591e6e158d2df6caa301dee73f30f0ffe0b2b9fd65e69fe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\favicon[1].ico

    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab4221.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar432D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2348-93-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/2348-64-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-558-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-3-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-0-0x000007FEF4D73000-0x000007FEF4D74000-memory.dmp

    Filesize

    4KB

  • memory/2348-557-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/2348-556-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-559-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-125-0x000007FEF4D73000-0x000007FEF4D74000-memory.dmp

    Filesize

    4KB

  • memory/2348-94-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/2348-2-0x000000001C930000-0x000000001CAEC000-memory.dmp

    Filesize

    1.7MB

  • memory/2348-106-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-195-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-1-0x000000013F450000-0x000000013F6F4000-memory.dmp

    Filesize

    2.6MB

  • memory/2348-124-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp

    Filesize

    9.9MB