Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 17:12

General

  • Target

    uninst.exe

  • Size

    68KB

  • MD5

    7907aeadad44a5a79a72f7f9282cbbba

  • SHA1

    5aaa99d1317265b928000cebac41b34e621b4a46

  • SHA256

    529f357deadbd890613b549f0a1e54468d007550f7b80ab8e5f0799dc99b7edd

  • SHA512

    0ac39d0f72812687b34921720b5eb0a76037eea8bc9a87d7efa16af9149f3e37dbbaed42b2d3517b3e2b6b5498983dfd6dac21ae3192e91b3ab0fa0b66444d71

  • SSDEEP

    1536:IRhoEXBpnbfRpQmJ/CrweqRECy3lvUyS1vg3XTsJLYKR:IjJ7nbppQmJ/CrMREx1vE1vg3XTsJsKR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.552200.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26877f1f78a88d0875d967cd61dd0ecc

    SHA1

    e60e5dda3ac80f805effa98f7ed73ba1a99179d1

    SHA256

    7dffb668e2be400a49046ae8c9f79b407a9cf6b88645886b1df9521a2c9f6356

    SHA512

    1b9ce8d08ef73e5335b21dfc9c1d3cd8856a96937ce806f3bedf44efbfc8042a8f2b88ca0513d1b29d4dae667a8433160e70606135b4a4d8d925435f8123e592

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a24da37f8726677b0ddbbbbd1fa2ced

    SHA1

    7a35ac03f4836ff5b7aebe4395459d3887c8a4e3

    SHA256

    b51c6e12dab5b5ad74d52f6cf80a1afaf702254c971806fdaaecef8aa728eb20

    SHA512

    788e8e33ad3c67cfb7e761fac12d25d3fc583ad407d7eb8776db2b9ddbba32b437e6c64cd443586210b486fa0e0d02943d4baef44a58018880e015c87a29f5a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f95c879bea9c9673f56b6da71fa08a7

    SHA1

    9abdaf5f7ab1f5f066c4dfac56331e75e6799aec

    SHA256

    bafe399c0497ce6a5b64a8720b887d2c7b642c3bec7c4df5618ab01ceccab464

    SHA512

    8d3ff6b4b01bc1ef860800945628588dcb4aa46ccb8c5c4dce766a0d53b680c3e71e23b50ab14874053eb600fc45080e596020d013271d0fc763b5d029313f28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e50087f997fb0e99287274dbe155586b

    SHA1

    ad7f0cc8c8ce7762de2c11531a33bd6fe52754c7

    SHA256

    9de457c45898f65493c45e28be6005223f2969c11227e47b898d9cb32ef82684

    SHA512

    9a273757e5ef3fbcdf2e2e4ba36556f9ba75eac81ee492e4f3448a1d20b3248dbdc0569a35e18bd948c124a9c6635c825478ead9c7cd64f0f6de958a13c8e265

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10823948a106622a603bdb74bb311704

    SHA1

    17bda3505fadf8eabed0ae3e298e3c7529fa2edd

    SHA256

    b5b8307285866d9962e03699d68a0cc5f8df9aa0f0c30cbd57598c282a9228f0

    SHA512

    8f21a90f08ada030c4ec55fa28d308ba1ee01de629ef4070dfe231e0ccd19f6f96ee6517a6b794eaf32142003a4d1204f172430a7ca4096d2e50b86d368d0268

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c6cfb44e7cb9207c51050aa116a329c

    SHA1

    0327e11ea7e383b359c79d87986760e8c01a6311

    SHA256

    cdb976c563821ca31f0bfa9bbdfcbda23b1d4ed57bd4d1f256799386c2a4bb8a

    SHA512

    9a0ddfcab52cda60c606ded8cb11aafc54a31377b606563f09c4c97d424a116f6aa7c8589dd57162bb718bbd512b8cb04e028de2a55658bb7896e7f18a3a131c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5fa7e5fa28e03b3eff6b4e4030e6190

    SHA1

    209f4fe1e795696ae91189e3012c8db3652f680d

    SHA256

    1ae66f75332ca41363aeaf46bb346c8938ca6c90b0ad880d03aab2435b244cea

    SHA512

    7bd9fa6cabeea7173fe6079fcf6871eb1a3ba5e8bd0cb0df2c48cd68aefe61ddc11bcfdc822728cae8c989fdd6bf04b1809a2a6bd73adf532ff99bc362e08eaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1149e262c8bde9f6dd6496b5f7ab5c6c

    SHA1

    e7d152e6861701abb1a70b1d8440239b00c25def

    SHA256

    68d89fd7e47b0cbb99f38bed97e82c083d5eafa666448b5400b6500f7d90ce66

    SHA512

    57ff1baefc88c8413c729412d59b12dcdc527a540770177515bb34ae98b5918bf34b9dfed4fd6e213f07eb83663b7912a98b73690b25751891589cb259e9e7b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8847dcd0ffde9708ba9e99279ece776a

    SHA1

    5942d97e7bc186fe683ebca6fbd479ba0e4d21ac

    SHA256

    1d0875f7eb25e5bdf4e82f9c8ba7f631a6b7969612696259aad0815016a77c73

    SHA512

    035e833afb611abe3f75230d3f35b64710adc11c9c6da5761759c5b8fa47a2d721f5c40f5303197eeed8cf4e4de16440166ff5e38cdcd15e42fd335dfff6e9de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f14d708dc8e30cec9eff9d11b31d990

    SHA1

    7a5af61f3b1e17079591984534a04ef23c5cdc8c

    SHA256

    201b247160d0a8b69c824d7550fcbdea9869ce50724681da39241f68a8f5e46d

    SHA512

    16e576a59dbbf7231607807e4d039b72486a641d0afefb03f52f14974919e35c0035769ecdf89d353c2997502f58bb6f7d42cf8f03a9fbf9e475903390b19ae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    110a792f513509ed31f02192f8d7d5ee

    SHA1

    d00f855c2722b46e8f47d937c968d4d9c75fdb6a

    SHA256

    bdaace33effcd0be2fadf7a82966d1a87f3950fab233628445fd2a0689f50bca

    SHA512

    ef09fa08d58658ac0d694f9fb6dc9688ea3a05a7ded934633e624e78dd0d46ef382fd70afbed041f17ed2a86569c3403dfaec94e70c29657503c1057daacf872

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    300309d61b3a4f84af981378cf8549f9

    SHA1

    2b3b04553b5dfce409c51c4d9e907118f33d04ea

    SHA256

    cd690732c763cf02f71909462c6833e7d239f421da15a4e61e3349cfb7fda380

    SHA512

    f24708bcbca11cb4c43d7e575b9f261c089c3b1c5d90aeda5ca8fa5334c620002e9ef5f54856f4e4b15a2e017d869505e605df2f1146c560405eee7931cc74a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94cee5737899558bbbea7dcba0ffa330

    SHA1

    282609040b8a9cc5a7fd0cf36db7e08876a8d5cb

    SHA256

    35da0b7bfbf68df965451522619308be07b61cd4a45f9be1f694f4f69b2b2204

    SHA512

    5a20d2446200b95338b0e4854ea55ebf35ae5d19a506763bf1d4923d840021db67216af7d8440ebaa6f262c14bea0ca34dd129bfb379ce1f57246b942c1acddf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9e285f4878fb76d7f89577976632ae9

    SHA1

    b2047ac95667383825ff8957c4ca2b700a9108c2

    SHA256

    e86306953f94f6fc0decbc33ed17b01fa578a977cccbebe5876fef7b0c692e36

    SHA512

    0dc1f44ae2e7f704e67b757f0d418e4f4962d0944b0a41b86fa84af34b590ab394120b5331daec35bc9b224e223c365af5d499da5d11d9931190862e15018c0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1332bfbdacef72a02ef1d6286b5b5d04

    SHA1

    7e5b45ca0278bc4991079c70902d471cd9b7b7d9

    SHA256

    0cb90eca71da2044ffb09450ca001b3371ae3119efcf0cadb627eea0b032bd1f

    SHA512

    4f716772732a46d4e825019feeac2ed80d8e8c8c42d0d9bc782d05ac0538df6bd71ba774452373bc9a241df3cc2d375281c67226122402a87238689afdd99276

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffbe89bd31a64cadf43087623c533267

    SHA1

    20b81877ce4a26c240ada1c976e0c9ad725a24b5

    SHA256

    eec853dacb1ab5c26737ebf4fab4ab6c0b862ba4c6500bb60cc488a4a8d6ab4d

    SHA512

    60883954eb40cab9155f5a20e93fec85e111319763dcacfc46c2c69a36491c725544b4d7c5d0c2d20110e16f01f67d3942e929faaeccbaa2d9583915839b4a97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7833c4694ce0df471970d30c0fadbd93

    SHA1

    807cba1971ac7d5177587dab0d9c2095ca3531a4

    SHA256

    6cd860fd55838908890585bfd7c7e7937da38b3d6b19045152b40e3538e65e41

    SHA512

    28acce66f0d53a1186c4209d61dcd9bc3c525d00b2959cf2b41a611262c9e2682d1fda23bfad4c8b89a352c7bb09dabf0875f076b7324625adfdc8ab5530bb24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89ffed47c08e6d75a96296f74fe5407f

    SHA1

    9d5fa8553a3ca7374ba3a978299cea7653589c00

    SHA256

    9ced3decbce4c82c389e042aa44a8b34b414077f0fb8e2e5a80fbd11a581491b

    SHA512

    42b739bf06db5eaadf5e03affd4e6592a67c18a270671c286890e6e063f7c197e9d95abe4d4c067e8728b164496a7af7bca984b03697385e067657f79bb2449e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f228a25ed0001e830aef5ed75c3cb1a0

    SHA1

    5dcce7f2edcc06501933bb873e4597c5a8bab092

    SHA256

    514a3b0db883f998801ef9217c5e78bebab618b6afd0d096c214b8902b2e6f05

    SHA512

    4afd283db5464f08c07b052a947236accff34895a01e82de90155fa5db3d13e602a870624dee49d0d1bc837b6ef89e7c1978913a602704e7fe51db1290333223

  • C:\Users\Admin\AppData\Local\Temp\CabA23A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA2F9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsjA890.tmp\FindProcDLL.dll

    Filesize

    31KB

    MD5

    83cd62eab980e3d64c131799608c8371

    SHA1

    5b57a6842a154997e31fab573c5754b358f5dd1c

    SHA256

    a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

    SHA512

    91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    68KB

    MD5

    7907aeadad44a5a79a72f7f9282cbbba

    SHA1

    5aaa99d1317265b928000cebac41b34e621b4a46

    SHA256

    529f357deadbd890613b549f0a1e54468d007550f7b80ab8e5f0799dc99b7edd

    SHA512

    0ac39d0f72812687b34921720b5eb0a76037eea8bc9a87d7efa16af9149f3e37dbbaed42b2d3517b3e2b6b5498983dfd6dac21ae3192e91b3ab0fa0b66444d71