Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/08/2024, 15:25

240813-st24hs1emh 10

13/08/2024, 15:05

240813-sf5mgszgnh 9

13/08/2024, 15:01

240813-sedglszfph 3

Analysis

  • max time kernel
    1563s
  • max time network
    1565s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 15:25

General

  • Target

    78999[1].html

  • Size

    111KB

  • MD5

    00bb206e6e711332d71b1cb740ed77df

  • SHA1

    992bfb30bcf7870a9b20501f4cdc4721a82eb571

  • SHA256

    d12d332a503419991743de6755dde8d860a08ef248bd49b7e67da90273655bf4

  • SHA512

    1acd4e9d7fc7ddf42fc4b3fed7dace79b957bddb99730567def9e88443a6f6db126cc0af1d861a682117eb06ac93a28db6b564a6bd6193b419da517060e757dd

  • SSDEEP

    3072:XywYkVdhEdvYR4NjHQZxxxAMO4Gs4zREx0nZN6EzVtR:C+dhAHNPMO4Gs4zREx0PzN

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78999[1].html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2696
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275478 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    965ef85565b629ea69c1a48bcedd4329

    SHA1

    0b6121081dcb59bb4ac21a10a5ee49273b7de514

    SHA256

    0eabb92df4747a3506ce8f7519b278002a416295ec313b8306a07351990575f5

    SHA512

    d143f1d1a53d6b56a039b9fbcfbc3977dd6814a1c2cecf974fba09e5db7d4ffe32ac13fa07fc4c10e216bbdc07be1253b17a9b3bdb4521fe35dc82b1f0ebd521

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    218d79b34a7b8d5a309c38e0ed3b0cc1

    SHA1

    414efe0945cdefee97dd82a9091ecf4f0e8d7aa0

    SHA256

    da0658f98d7ffeea5fe62bd8c40bd1bd8b99bf1b90cf34e6dcc42a6487cf3a41

    SHA512

    63adeb5f62ddd3c856157c07de690eed790e1c559ef21a3dac8cc04152718621ab7602e6ea311d33c592204e80b1ab9e2d63011478013144b1df16613bbe7a48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7066a1bb60024696b52abe12c6967055

    SHA1

    43eea9024bc183f864591a36467c46a31bec0015

    SHA256

    c31df352967390cc31a17fbe65849e3f8fba3696aa98380a9fa050d9a72891d3

    SHA512

    ed830e2e2f8e33f28a4c939b8ba01228eb5a4459cf9d2b9da0f6d874f4426472e48bdfb426b2d4f0d90e58eee78eafbaf62ae511d911c801c1a16494e0fbcc64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51ffc52f246cf9d78fc5685c92c963dd

    SHA1

    cea541b1bface48fb31e22f6321a7cb40b3fd491

    SHA256

    dfad5c0e957daeb9f748043702fe4d665f7b11da86a0a34fc276e432ef1d63c2

    SHA512

    63e00f58400092f8f23ef8ce1f408bba6ccda21d6a871bce58b549288f39f6bfcc585e1e22c83363c9412df52d5a665f45827702afde04b38e5558f04f66ea2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    423e674f76b8ae4783ae5b00b8225f1c

    SHA1

    94b80fae5129ee7771bf3c97b179df0e74cd98a7

    SHA256

    cb5df41de449d04c9e9ecec03ce7a2488baa3efc1e791e7c1bd4fdf281c8e3af

    SHA512

    99d914f522af4b24764e2f5c5e046dcd2ec66c6839b1095dfed5e69d71d1c0cd338db8be20b9adbc0aaed98c18ab200680ab80b252f42e92568971fb2d714095

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa6100151cc95598aa0a7c02068e846e

    SHA1

    2c3cd51568f2eb81456000b547bb182f1f0159dd

    SHA256

    9acea7f4cf128d38c898348091e867db7092a8e9f4b452587bf868af249a08e4

    SHA512

    941d533a62f908218cd78de6fd1f6adeac2faf67d9c65fd63946e6add079fcb7bd35c76022a78981f210bdb2714d1d6d90f8f8aee0e2b615d2878f42fd84333c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6711fdb9d28ff62b45eaf71b758b4733

    SHA1

    b35e44d43cfbda088d6bd912bda4fcac591ea439

    SHA256

    decb422a6b7ccb062b2620eb13c9c5df46c3cbc41c333467626c2a673390745b

    SHA512

    f0c0304dc241747f11ada73260a8d8f11dd422f541b3c7c0a50e4411f79a47b42b9fbe9996ac6026afd19d3bddf81159e62949629191de11df14cb18029aaf36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bfc1f7fc9cce8de9b3aa0fe3070d9df

    SHA1

    6b5cff95bb59b8bbba3bb33682cb7ee1466ee5e4

    SHA256

    fbab16f835f944c6d01b2a7be47145b26d63d6b3257712344da13469fd1b770d

    SHA512

    9577462d32698652c1257ee9ce26bf9d33875d1e12fb68e4a82bd38a57997e391f4a07874439b8a0c446c090ebc2b0fdc68fb7afa76bf53c66083716ba4bc38b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cca22990ba8ec74d6b43616b106213d8

    SHA1

    2f4bafc244c19ebafcf32c9f1860af5c61bca757

    SHA256

    1072130003a11fc83ce2e1af3e0fabf2afc5600c50c0d708133cd51f4d7fd1fc

    SHA512

    0e3c31b50332cf392f633a8b8db5529110ef3612da11b645d7390081b8734da1c30f83f364b338c4b1c711d80738187560411c7a821c1f07d43170a50ad72050

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00777e53bb81026cb35ea7637873f01a

    SHA1

    521b34bea1e30e5618cd4f4a40eaf3bb0ea41b35

    SHA256

    90dc08711b821f91be340ba9328f5fa2a77e462380fc039da7df7d21dce13613

    SHA512

    789b62fbc7d86e790b0c84889d5e205ed55e4915a2b9d382c258c049255abb645ac4dc149ed8f7371047a93d39f5dc3b7e67f0133e39eb08835c1a34d9d0673b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6964f9957fe5748abcd15b0bbb0292cc

    SHA1

    83bda7ecad3d879f2f118a6e87b3e609cba96638

    SHA256

    35abc3fd5441dce94fb117463873202dceb73598d92dc0be4ba7fb2c2ef55f96

    SHA512

    c5a122e90bd535bf88cff90ccb094c7951b41a314f71c322efae9e73510cd75c4523c2f1b1b33f268391b47f6f99bec1539c775fc0df6b38c550d81e6e6d980d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce5229d0c4e262bef46747a415f39c2c

    SHA1

    5a77f392083dc487d04afcda78379d4971e5ba08

    SHA256

    7a836694556d3a724714f7c18582498960fb1d5522f0d98653d9b41b1c715fd5

    SHA512

    4678d503f5273aa06bd7b58b7c1e6294cf4189bfa87cf29daf7e5c6181da3543e5af1abfef6ae2f81429dbe3f4e311abeb945b8a42d89a310acd01694422cd2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec51b29be6585d61ce3c4c69d21137d9

    SHA1

    70ab36e734d2cacbf0e1e570d073682890bf9809

    SHA256

    aa0d9dce38fa6815b1ffe71daa26e8207b82223908586df9dbbe2529772a2a1f

    SHA512

    9210d1935a3aeea193cf135377dd76505dbdf950db1cc4301cbca180674c28a63b8a85730e268937f4105ef25f30388ac1f18d8b2d8cb78613c7df6299724663

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cea56890df613700d2d3efd49c0e02db

    SHA1

    9f04c61f651fd851b6bdc5ccf668ecf1dc9866ef

    SHA256

    0fd8c8b797fe51a5af1c77363998d6e14d99046f4bc28b878d9cedf0ab2262b3

    SHA512

    9dfe213b34386b54ee2edcbaa0eab91958f9b877b3bfb9943a6d5e2988ca11892bf34a709190f80b628a0e8fcf15b1902149e3abe2f0aa7f404d3c98a7f886f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8331c8fab32f846fda7c1003ab062e31

    SHA1

    b4d2aaee316c573ec8a2afb700d60408cf2f3130

    SHA256

    2a2060f0f5942cc3a07730c012cee6d3bf3666a4a13960445c77f90df59e64c2

    SHA512

    230c29d1ef7e339affb1bc612c81f406ce2495204219056c0195595815ac3971a60e0313de83ca9521df14cd10d36aca9c13c0131f08a71d02815d979ac4937e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a15b7b4264dfee65a2441d82900d3c7

    SHA1

    73b620aa107b5a297935e21739ac1a46fd2d3681

    SHA256

    75644fd2fef1e65c27ea329e16669c0f2d4dc59a065c5c7a53496feab583a9d4

    SHA512

    7928804a6ef66d8c09920431c6b74e73159fb012a1f3a079bf0135676cd620b29b245cf1e5f95f621bfedd1fef4530b11d6f4c05e7e4a9e8db488024fb23ace6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21e5c0af383d00887bde082aec7f49fa

    SHA1

    2120036a8f4577adb3c5af43d359b8c915bef407

    SHA256

    c0bda4dad7974dbc63a8e3c54914b543e50ff680d299e1d3cf269611ad16b3ad

    SHA512

    e199b4dbc7de39fb7b98eaddc13d5d010088f4589cd0ee06c326b792d1228d63d0ad94032e980a978a8919cd5739f87b8f44fd09d9da9f0ca1681580d10dccb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f6e63521fd8dbdae8b07d524d7804b6c

    SHA1

    56ca4a7b9f775a3846469b5513f86642d2aa7877

    SHA256

    3889ab063907307a1736e1797d35d2bb1016b5afff50537c60b7cc77cb996933

    SHA512

    648700e23043d3baeca5ece852d51a72f6211d47bb14e1a9c31f90dcf25a099087b0c2cc93c45e67651e9429847344e6636cb69b4f4dbdc52da21deade3c0e98

  • C:\Users\Admin\AppData\Local\Temp\CabFD04.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCDEB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b