Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    70s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 21:32

General

  • Target

    BlitzedV12/BlitzedGrabberV12.exe.xml

  • Size

    320B

  • MD5

    c6e6fc3cdec0ad213d9330a9b630fd5c

  • SHA1

    ed4278e0e4b9d1b47fbe92ca2f98af62e5d6c027

  • SHA256

    96c2db8d8037a20cc6550c935f9a11da70f84a2bc64a1be1807b06bc1bda2492

  • SHA512

    37ee70ae328547b684db668ce59c9f7eea672184fb1f5ed41341a0fab84bbe0419f0706742832fc6f1ae78e474cd1d3f5f757fc9c44ed0ca557101a733532e0f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BlitzedV12\BlitzedGrabberV12.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f793778892e44d77cfb37fb997a54bc2

    SHA1

    75508adcd83cf9f7351a278e2c325472199bf8e7

    SHA256

    0d56732fa81f07c3d7a110326ad1fb5f2e4df74d27892ba443b69601f7f9bee1

    SHA512

    8ba4ebd1cc186f66ff59861e413c90dc6ba3382f1d5ef3ee4eb3dfff32c904b730c76df16febb936fc25fed30006984b3f00565b496f467fe665e520bbce2e8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb59d9d7bd008e6858abf45fba6151a5

    SHA1

    99249bb97bfed304c63d7acdc87b7216a48f982b

    SHA256

    3d008a0fa1ab0c8865f242458e61a61f865d40f726c50ffa757ad44529a52251

    SHA512

    b282d79ea14385414dc33ce76fedb54286d964082fdd7359b0ded368db5c06817d06b64ad63514e52573b42ca615bb887538caf14b628acb99552689e86e34dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9ec3e6683f1a97179c9c50a001fa583

    SHA1

    af80878e8f6f351ae8f3f7246ec8e63e51ac8d39

    SHA256

    45cccfc6d339c00c9acc1d75d444f5d73835e72ca1c4f6aba8d7e34594f24213

    SHA512

    731b35123ebfb852c5d41033c9b178e52be845214343cb0e7341b54aab3607fed71e08e1a9a92a827900384d68e61db836653b0a16f0a6c11e42ebd5f033c336

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7900e8bed6ef2d0d8137534e01a528e

    SHA1

    0540f62003c0dd0df4addb443279805413ea6b36

    SHA256

    5dc50cbc8eb54314b4412079c6975e5fc1a555fa60de0ffcfee462d497859dc8

    SHA512

    92cdc51f41e82d49ff4b1e161c7296cc48706680cba6a458de362cf2f3e56e08caaf1c1cecd888d15eb298ea48964f2ee9939e17a910c021ab510b0af24483aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37eb359ebf0f08af453c05137cc0e898

    SHA1

    0dde2b6e7241f32520b7f97277b1e6981d1deca1

    SHA256

    00409e482f8a40c954ce06b49b1d28ad470cdef75bd2691513317514514b621d

    SHA512

    fc3ed14b65e5feae93d7ddce5a7bdabcfe1210d8ac4db7fb16bcd228e19272ef0fb0954a64e5faa659917d5396004643d0485ed69573e47544860f6902a3c05d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e1ac64d8425e5e0a99f8d3461b1af39

    SHA1

    01751c3e96d201f83e2f3d81e46b1e782e121201

    SHA256

    dbd5710f5ed4d4c4f156ae0908b085376757a95a5533c1fa50818fccacf2f2a1

    SHA512

    2e5a64e0c2ed875f90ad12160c5ba452ca315af26faa34eeb569b3d05a36fc24186200b48a0cb067c67f35ade9fdd9d3d2f3eadfc3602968152f3cb5d204c796

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68843d2eff9a6ae752700d5e941f7101

    SHA1

    35482f809cccabcef9d1f577425065d0996327b4

    SHA256

    9e73bc5bd6ecc48b0d02df8df7b16fee5d258935b1a6804a4cf80477cb351551

    SHA512

    fda5446e6673f39710dc16b49b902d0678017249ed6f3310a1b27624878607c05ecfb49f69b714f70c06f5c2622b5c6c98ecd9a8ad281e421f7c3932faa26533

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce827ae8a42f4c2d77a840bc9b774a76

    SHA1

    8a233949876527fd83114def2f3c1b4108f0b5a4

    SHA256

    46d1c4caec404fa8f918b99d0f6f5a2a05397970baf190444af9d25d702cb855

    SHA512

    4a51e91cd7016587da715fd22f110db7427a882d10ab5284a1a78e19aedbc6e9d6e74faea97f452f00080653f6a3846b632cdc6f76babb7bac7867c58e5c068a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    106059225b46365717ae66bc06bfc83d

    SHA1

    e29515f9371b17d15b83045cad65b7d2192ea9c2

    SHA256

    4a59ab2d74e7491e301056baee7d9f43aa1b561b20bd32bcd72f30ecf1806704

    SHA512

    4fcf628f9213cfc09ea6df46732be0868c5f02b6fd546bd837917a0972144f37e06dc9cee672218b836c3d71badf0a79acf755ca96a34310bd660035d5c23a60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    873704b8b058be1916238bcc41f56f99

    SHA1

    2a2333dc4c0f075a0f35eed689df00e85c6b03a6

    SHA256

    a13b4efd05b71b10431c947954a41168540815085d8eba8744b35b7f826a1065

    SHA512

    8394ad7b40cd8874ac16c18a6dfd3f203700777ea79897a43ff2e84bf42e3d5cd6088a4dcf52d3b5aeb6b0de6f74195fa56c98618cf24a2edc6f01df1b2a6320

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3bb44db342a6608bc93926d13d751b7

    SHA1

    ec7d805c42eef55297edf50f73139261fff65ca2

    SHA256

    3234d0678cdfaaf9044d21d6f127a23f13d872a075b79842007f40244f73f19c

    SHA512

    c8e243ec5f587287eabd5487c90c58cd26de7953ddc6324cbc3c1560dc21273c5a6cf95a6e46b435163a3420bf13f210c945d7f4f094a097f0c9bc2c1098bf57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    618cfc8594c00097a861334b714a3aa9

    SHA1

    52e1b76c41af9e3cd35414c61993a12b29d3c791

    SHA256

    998f56d21db16af84b34d3fd4dc40d32336fa6f4146da6385115a778cfc6d0a7

    SHA512

    ba8343af06e4115361433f33e949a545ddc662e68367296185e61bbc375888d25fc12fe495395625a2bda23fa0d108742f7c7a14d6d5c88ad3946f67e7abbbc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22987e4d19ed208781df349bf5a0fe5e

    SHA1

    3962dd9212db475213781ec0771af6ccc41aadd5

    SHA256

    596410e356459159ef70e0d43c287f3631efb8867f8a5d5a5ba92652841d1837

    SHA512

    0dfc6dcffd151513710c3ddeb86c266c5a0bd2ac8338f451bcfd629164459750799d4bca316b255d7b8d908c3d02290995f482e54eac56a01ef9238ba0652015

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2680b4f06b3b80a4a022e0fd10edada

    SHA1

    73181048ed8ca8b2296b1fd41e04524c3777b19d

    SHA256

    8a5c3090dbb20b78733f6f23c472de3d2439d3c9320f96017cbb60559db7bfc3

    SHA512

    d28c92334b76b4e62481433e506574fac6b22629aeeafcf61f671cdf8072814b6fea819d98cdf470d2ea1b2e5c476b87412b6ce32e4acfb7d0e7e778afc786bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4bf2ebcdfeb67e0eec52b45edaebb9e

    SHA1

    f5db9bc03e9ad12d43c8d814d9a065ac256c267c

    SHA256

    2465aaed30c4f838b7739e56c0f7392e09bbcaba0e7cb8a2fe04b18a0db6a432

    SHA512

    2eed7def2bdd8925d7c9941d24f7a7fc019c2d819101cf31eadb59fc47e88a9aa1f1f94214a37a258e2ded84481f49bc6f1094d80370be1956ace1a4469fc02a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae1d8e88cfe4e0d239c99643a921e85a

    SHA1

    23ce222699e7efcf7037d73c4ddfbd84ea0399a5

    SHA256

    9cb6ccae51fbfc0c77f4e9f6a623af2550869c3e4956def60e25dcefb1e85513

    SHA512

    069deb38d62a928568ed47befa031dddce02135f7523650c2c4f336a70049b77fa45362ebb5de9f74d5bba6ded92242d965f0ab6a9c55466e8b9bf93affaeb8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eeb816ce87607680828789884513e429

    SHA1

    89ac1d62a1936df29e843c63432587b140b6b895

    SHA256

    2c74a8d2bfe81476e24176c57e3bb2dc77bb258409c70ed02dd87c940e63e174

    SHA512

    7294e67542a8c24ad2fa34d8fd5fec1468888f3cf7baff83d5bb742f03a6f72fc6118f88cd8ff9d88c559ed59bcf16334e6dd259c046ba18312acb0e31f49e08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ba0847bd4945f975c0f4d81477bc9b7

    SHA1

    b101524e166ec8be2959eca0e9f9cc2cbaf9d9b2

    SHA256

    8cb225fea87aa9b084f6fe6be81ea882b5690ff14f9c3e9225a418c0d1f10f4f

    SHA512

    7e8db652966d9443bee3e01e9b0da020c282226ecaf2456842fc8d3d776dbaa2d713dc40ef6ab9b9a5614e31ffb75db0298964ae9975df8f9e2968ce2de709f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6faa356836034bd8738fdca464ecafa

    SHA1

    c191276dee903c802ae8d6103f95681c31380f21

    SHA256

    545d83ee62cc967b0d94d9974919390e6824901c480b2df08ed86860f8e3ae61

    SHA512

    ecbc888b1a44f6cdb01c1abd26d927285f0d0223e6db582e6aa10a696af7e0e75ad271eee9ae8dcf7a11eae1fdc8a88e1c8f76a1ef2f9c94c1e2059823c7205d

  • C:\Users\Admin\AppData\Local\Temp\Cab6DD3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6E91.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b