Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 13:10

General

  • Target

    DX TextBox 多功能文章编辑器 v2.0(.NET控件)/dxtb/help.html

  • Size

    674B

  • MD5

    1a8c646548631f571a3a88db35a40bb6

  • SHA1

    19c36d3140037a6a4abb2d4b74e94115fbc8ad1b

  • SHA256

    d824431e1615896b38f84068b1dbed5f82b2f4be0e4a81823851b426cd332b72

  • SHA512

    cde0cfa4322a08afa394f54f4595f07f7f5492b2b1f2eb7896b3f8f395719c53093231cdc3d21315a241821803a6ef39665c5275c0e53d0a281de44d5eee59a4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\DX TextBox 多功能文章编辑器 v2.0(.NET控件)\dxtb\help.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2160fbd79959a80c4fcdec07d6a3d8ce

    SHA1

    88c973582d36e44cfb861a5853f6700937502304

    SHA256

    536697446bfae5b82b388d8f8ffc1d898b49ace9dbf178b7d074a3e6dc1e86ec

    SHA512

    521145f785dc6c10b659ebc6d10b34c6a9d3802405fc8f118208ed089ac4f4679f558ada9f62f73a21c91ebd755dcb6b3d986f664050dc8a8d5cea67ca179183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc0326926b063f6ee5b007bf2ccf872b

    SHA1

    0ecc4b39129b34a07d967a269f76ac6baacb4acc

    SHA256

    87db652c73b5844d8eda486342b7f6457bfcd564b91ad67d85df8c756bb6affb

    SHA512

    812160df588538deee26f426ecf49c3873071dd0156b18ce8fb42b122d8f935211d8105c7373214fbf8216dd2ba1432fe837a7da7e83ed0ad991d24406f5973d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cdab91424bfc648efbcd7e74fa5fde8

    SHA1

    ffe807f7e46abbcdfa4c6d68334331f194e65144

    SHA256

    762d4fdb7d3b71b8966a395321f456dc3841cf93eb018d0f98c3a75f1d7d1067

    SHA512

    917b42c24c0b1af11f10f7de985d5d00107cd2271a93a7bba17bf459e9be7be42d592a3dc32e53360ca0de1129936d6e7f710b2cb8fe96d284cbb408711ff0dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00435d6683e2c9a5af258e37991d45e3

    SHA1

    0c2bac818c9341ce582f0bd59f70ac8962511218

    SHA256

    2504580133678faf340647674dea5b52560ecd578648ff74f7347b80e2dc6fd2

    SHA512

    940509c307f0b806af429d6c59e17bd770714b20e25cd52712ff16fcf0c2e1149da91aa9b8a214a391fe80bf427b0aef4edae3814f321a51fb00173a904fd3c5

  • C:\Users\Admin\AppData\Local\Temp\Cab37A6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3884.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b