Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 13:10

General

  • Target

    DX TextBox 多功能文章编辑器 v2.0(.NET控件)/dxtb/table.html

  • Size

    10KB

  • MD5

    d857b50f7d9db110ed2a19cca7db34d5

  • SHA1

    7fa2616900cb0ed4a1f0634eabbc24558aeda64e

  • SHA256

    9c1980d0bf9f2870d851ba60ab0990bbdb82ca0d7be8b867a4d67ab58ea93963

  • SHA512

    806985270430ee98c458c90d939c09241df77ed6b5e8e7af6dadc9fdf39dd83750d1011fefd8662af0211c2c0a69124e5cb0789d031453d4914d1c08c7a29fa5

  • SSDEEP

    192:ti1uX2YgncZAoGaJ2sCDVcRw1CL3bD7l45ZQqXJhDXohqaKkba4N:ti1uX2Bc+1VZcRw1CL3gZjh0hqBkbaK

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\DX TextBox 多功能文章编辑器 v2.0(.NET控件)\dxtb\table.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1459ff26105251fa69bcf3ecc218ebe

    SHA1

    d3b209a9f40cbfc8bf704a1fa38aa0cf497b6836

    SHA256

    c47706dce1cd20128bfd465033d7099095c848383074418710d79f1a176441ea

    SHA512

    3696cb7b44fd02dfdc89060fde35c8aaaee567fc60426a74dc49ca26c1ed9566ca1dec6bae065ee64cdaa1fb7e6593d95984378ed00b18e31c15dfffc97d2b66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d09fcfc7110c960da25b0c8f743566a

    SHA1

    7956f8a8e0062694f2a755a67a5ea02620d464ef

    SHA256

    26d85640487aedc8dcc200f172256a03a84dc8e3ad8744f2276689c739aaa12f

    SHA512

    7f50d2cf5908d5c2e3c17f2d5d2e471772acf6827883eaa3b97e333f060f84489a0a194179aa2354670448a8f59856edda2d0747d869c3c3b8bad57ebee3f59a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82b42b3eac11c792699a5b198466ba72

    SHA1

    db4794a3140598b63044871b0cab41c67ef27cc9

    SHA256

    438423103f79eabac846e7ad3617068404c38fd1cde67b34b8080296ab4753ac

    SHA512

    8fd8a2219ca27578a2153a48b70782574c2c160031b8d093c24e67c7d9b5b8aa077b8ce8a1b1d691f7b7a811e6528e30a56d0691d73d62e2f520affd08c564b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9350462dceef94bf3c4237b10bd2f65a

    SHA1

    92015c553b962f17529040225dc3afd6038d0a33

    SHA256

    cdd605c51739d976037bdc3fc436eff10501dadcfcad8896e7502865a527112d

    SHA512

    27f5183387b51b7247165fb35e8df3506b2ffcf0f45eea1af3cecde11c6c286ad21a06df12785b4f84b03296a2641f53eb66108a76875861d01b8b4c74a3ff23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84377c53fc8ce26607798f8b569ae337

    SHA1

    ac88adbb013855e997c812f99d7ba154fbe912b1

    SHA256

    eb3cb6606e7e2fc2d161f49f17bba9c9ae0e480e195f8a4945818f519ec5504f

    SHA512

    4fe14a55567173175c827e8fca61a60825bfc7f495f019fb9d5e03dda1792715a81164e679432593f72ea7539fbaa959d00ddb13bbdfd3a748fc7ecb103564e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ff655041576063f2386ae65e3ccb8da

    SHA1

    a24bf4961ee49a87a3917b20f900bd232d58085e

    SHA256

    c6c09038285743438820806b19d97674ac87988ef142187c5f088970ad096842

    SHA512

    a470a2a7f013e8d5bbdb1834f451269204f8e0977629a64e38a766eb7998a69d7b53f66e79ec4d0eb2c615e209bf56e45e2b05c7ad504e8fe2a614208189573d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caf314efa6daa6f98f20d9c18cb36088

    SHA1

    bc7a057e504ea56e13725fe4226c5c2ff28254a2

    SHA256

    fa44d52544d52d4ffecc447d042d2cf072f288aa5b82035b87f36909dabe9357

    SHA512

    856df703a75250be83e7aeceebba897143b8f31b0515a832e2c7238b9e6d7e7d939fbaea769b255a3f939e811f448509524c320f777e4f6166ccacb035280963

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71e3005a08ac2bbb37d530e5721ffc44

    SHA1

    308a60e3f61cf9fb5839ab89ee8453f2810fd47b

    SHA256

    d9723bd6c0f52c0cc40c4140148868efb0113f72abcfd662efae20daf01dd430

    SHA512

    b20b50420bc46ffa290b71cf4f0ad1f70bb0dc563d01454626b421531fbdd786c2725013ffba86e1b7d34901424cbf5556a4182ad1c70cafef8db18f025aad41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81e4e6e3b8414137c64af215dac93302

    SHA1

    69b679df6982ab59ba501c90c1cc944cfdd15e9d

    SHA256

    5de377b10e5eba859acf12c97520e993fd69ea2cfc59c8452a9f7163dddeb97e

    SHA512

    f073f737aeb84ddbcc2cc985f7cf53d4c0350abdd3fc009e467e9f9c23aab0565b7f63041ae46b78ddb591a6ee8473e986f473e3af07c40d545d85657a905541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a09e074d1ce60896f8d99ffff042bff8

    SHA1

    383ec1f4f8828dc003ed237281605f9bc984856b

    SHA256

    6b3fbe217def91a8eaaf64e37aae99586b661b66b0820b44f6ba6dc38fd5c9c4

    SHA512

    7b49b4ed8b4af8689cdf4799147a27d553adcc684b65bd972966ac1c29a8d4c227f4aa83beec88ad7c7a048331e22a01c35eee2d1a55690b10dc82ea108f7e7a

  • C:\Users\Admin\AppData\Local\Temp\CabE94.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEA7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b