Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 07:37

General

  • Target

    4954f477331f00a13641be0b11937220N.exe

  • Size

    653KB

  • MD5

    4954f477331f00a13641be0b11937220

  • SHA1

    432017d1499da176abad209500331647452366bc

  • SHA256

    11e39564cab14b08d3b666dc858a4ac3a1b35d260cee2095c92fceab9f55c1e5

  • SHA512

    8212ce403dc21d2e88a65fd53e86a5f50e8315cadf1dfb02af049037dd38f7d5955e21d74ee6c13fad56f80335bba13167ac2331a38552dc9fd1e6c521a0bfc2

  • SSDEEP

    12288:nXnF4rdla0RHDGW1gojJvwmXJFPO/adFn7Td7o:nXG3a0RHqW1goFVXTPO/A7T2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4954f477331f00a13641be0b11937220N.exe
    "C:\Users\Admin\AppData\Local\Temp\4954f477331f00a13641be0b11937220N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.stahuj.centrum.cz/downloader/done/?created=2013-03-04 07:27:23&user=&success=&error=icq/lista-centrumcz
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e473766caac66a3cd00fec312051e51e

    SHA1

    f658f656d85fbb354221e87e3eebc5eb93c107bc

    SHA256

    514004ec7172303c46f27ea83376b62dbac06f1909f92e7d0852e9eec9a7e746

    SHA512

    10b444a5dddeb3120928f586cf1b465c765717b74bf666c8bc33140594cd13f960606c9ec7bd934233784ff9a7098b48fd5b9a2ad8860239887022b080652457

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e543696c699e9ffba8dd14d2aaff5ff

    SHA1

    38a4d5339990713d14f7a94813d02fca4761e699

    SHA256

    f6648eedc5bee4a8619ef6bdadc0dad73da718b4fdf7ac580ff65154e05cf637

    SHA512

    201d00c366cfa2e4350bd0ddeaa555a140b421c504a35dd5796ab278a4a8e05abec416c9f4f7bc7d9d72857192c7104efaa0876f9f74fda6b3987396051c382a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdbec6e3192ad5968a16988605435ae6

    SHA1

    6e45a1e202eb4ade35cd417e77f000b5f657bcc1

    SHA256

    a3cf2cf48ce1ebd38f216985da3146b7a315afcca3373c8ffc084d280077bdd4

    SHA512

    9c0fd5988bc895151b603786f0ac34ed0f249ca16bd161dfb3683298a9889a48f55ddf96ead437d4dbe0386e8e843a3b3269ac35741399d43093ba95103613fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    591d8d23536e1c32ab16625f9bcf6479

    SHA1

    5255a8c8c7841b3b68b4e3a2f7443bb8d6dc925e

    SHA256

    55c70891a0889dd56199b7ffc89540a31932af94a7196bd74e67cdbc6360894e

    SHA512

    76db4204597b06ce1e3e3e199e55b9df245e8571dbb2d6f5d18d2e01d8ac2a9e11233b078005a0e6613e529981655ba0dfef51ab6b459e2533ef3702b2be5bcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    341825af9bd6711c20b5e7d96c166617

    SHA1

    683b8b8ded4112d7dc577cde2734cd3e7cd9fdeb

    SHA256

    e0aeea89cb7721319436786f7b887ab6367168f5eddb69bcc89b3ca5a8d7f1b8

    SHA512

    dfdc24d4aaba7db1ab2b36c30f22fee59b22086fe5c627bff993f2c1ee9bccb1f8a2a05dd8f96e66e0a7abe0b2d93f262182ab55ac92e01c7757f0954b36bf25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d8e5aced31661ab8d8f19f14c7d1475

    SHA1

    17c34d717df554414d0a39b1deafaa5f3f7cc569

    SHA256

    297641c9ae0994619b00f7d9a09facff928b3ad3eb61bb1d8105998e11fe22c3

    SHA512

    437080a4a8e7f4df7ff3709c91167ca408938e57b3845fb0dd4d1726485b394d2cb41c7d5531f3d5898c85e1ef72ece8d178c6a06cf2df3af8665876a8a6bef0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c77e831872717b924628397acc5aa274

    SHA1

    a7232469968566c0e4e5909494cd9707d2f9d96e

    SHA256

    194b0fbb2aacd4c9b60ba8e8a20ca42d64d81da82fd27416744888b6d5207ab1

    SHA512

    c2f17aba58b9092683a86aac0ce2aa003ac65dafd744b073c87c33861b176113ce8f0f13d5ddd5b4a8f61f9efb7cf6cf0baeae0c338dc568acb1dbb45b202cb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42d51c3b7804a7a69f2070c1086d1c4b

    SHA1

    1adc4318eb2aed105a1e639636b788d68ee7ca96

    SHA256

    14fc2a6e3d07580652a0e764a418da5ffc29fc7b0ebe74a85eb9acfb823cb82f

    SHA512

    5a758bc173c67afde80fb7c62c8d1e91e88b075d41b7c2359fd3c8eb391f89913327913a0380bc6784259a1d5d29b42bc08774c5a6504a0e1bcfbbb7d5a96f59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a7e3a6f7d45d1f1200b100a05f4cf9d

    SHA1

    a2c5fdc478f14f5a50deb24074be3a9bd12c062e

    SHA256

    8ec47a08d686ad7081a6be23660ef5822449c251fe4793d99509172c9e5f9379

    SHA512

    cc3930856f57d8b3542c0f810806788f3460ba7445f36898a4ca4c21730100b078e73692b1eb7fa4be40ac7160680eefead31f91dce1da1fa1de5a9a4b50c501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85a0d096ca3bf906f5cf37b59cfd1c93

    SHA1

    27fdc3a0c5c943901b95ce117abd82a1b0690a4e

    SHA256

    9a861879f658c4386ddcf01e79600724019330c4eaab10e671d00ec7b137f5b1

    SHA512

    ea49d165ee71b444a6d05f7404e08fa1b3abafd0a9f1d20fc630a9c599d0ae6c1f599a0f4bcda99f0517c202092516b178fe50ed841f29b9113673362ca3def9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a127f4f8bc59660749d50f413a888ed7

    SHA1

    ad19dfa2e4eeb214d3f0208907a3b6bb47f88263

    SHA256

    afa61f05472a3f9d21d398034fb835696ec11d8622614b994cfbd32bd395eeac

    SHA512

    dbdf4033bfdff2b20313ce30e239f7f85c60a377cd63f4655b99a2fa42a6ada74f69df8641932be36c3b23a44868b9982540c41cbd2482c93a86f47b2aa6d75f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cdd27c05f5c49782635f9d14fa5b07c

    SHA1

    bea04af0a191c0cdfb0d1565b84c78bae9e0eff2

    SHA256

    c1587794d410923d6fe0b142e3e74d3306a3fde80c1288e970398fb6589be5d8

    SHA512

    a6a14d1fc1f30e60db69fb6e8043fda8b094352052dbc2fec788344e1155606806c67762651c90036dc18b1fb4bed0a019de6da4b892f4a86cf4e9be902900b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43e40529451b9d094628cdf25a3b4eb2

    SHA1

    865b32a2f7ea22c9a82004dd016f5c252a479bf1

    SHA256

    892a645694785babe7d06b71837a6cc89d64fd0d248c7cbfb30c3d075f3f4cfa

    SHA512

    051f47e51ddfe082ba56b63dbc2fd6f0db942e427bb6f9b61560bbb158872a9580ebc7a0310c52b06a247b7445e54505f35f7e8bba025e5041e4f3e341844f6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfc7d4ff33d781e66690475c58875322

    SHA1

    485ed2aa9aaaa9d1921792607c265ffa61defa91

    SHA256

    085173047ff57368ce1e690d5b4c2b542d0004f2ada1f63b5a74c5f62fc15f54

    SHA512

    42133af3eb80c7214e1055c53bbb34dec95ce2da8aa722f64cb424195b4f96d496fbc8e44f4d0f662253194e704806ca1b86e37bbf9c2633c45cc09719f6f618

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d223a963faa40d1b470907a2808ab382

    SHA1

    edeaa83e734b71eca5b3644ec68287418703c109

    SHA256

    91acbb7d9aafeaf1c9216e5bc890898083ae30809be5b7aced88f0f16ac9e8b8

    SHA512

    56e2115d7bb90246bb6748a77f4f9e44999a40a6240f5c981a38b0883698d2b63d33631e40796b41bd8ba9c96d791800d9749e63129c59a412a4e713f488601c

  • C:\Users\Admin\AppData\Local\Temp\Cab7F50.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7FFF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2820-10-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2820-0-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB