Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1440s
  • max time network
    1443s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 13:45

General

  • Target

    System.CodeDom.xml

  • Size

    366KB

  • MD5

    91af6294c77371e6773c35cfa7edd068

  • SHA1

    0c24bfafb91ab69a3a7a4bfbd15a9c346341c487

  • SHA256

    92287105a0987fc6ea2404e799da13f2d57b228a1fa3039a6d0cded00d4344c5

  • SHA512

    bdfb5c13ee54b88d029bae6a65f932bcf27b1d71a5c373325b2e7484d21d49745c2f3983da85d50aeb6e31febbf0bfcb3cbe46415bae15877c20d54522b65904

  • SSDEEP

    1536:l2e3vRrYxV4Tm0/Y/LFC9YmXVT2Y3mBhuzRKqn/gCOIFnffP6Ks5ATTglg2PLaAR:lK+c9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\System.CodeDom.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:264
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5e377cf43bf1987cdcf0898addf7a93

    SHA1

    16fda80f46eb2d4589b781e75ef9e14cb0871a61

    SHA256

    8fa5fbae2b1b84f5100844c11e7574c086596e8ef984d587a8de7d0331feeba8

    SHA512

    c678d61e67a66523c8a165caf04c56ba53ae44be4feb626be20ba937a9da2276cbf46941c406537b0fd645b434f5823208e4a00a774cdb73eb063c1c1a165676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fce84482c250233015e3e645516ba41a

    SHA1

    f22d42d2c45a5004e34538c0696a9b3a02960dc8

    SHA256

    01c36cf30feb7e09c0179b7aff6ef93bcd7a767a80e02afc16f38f6cd947e3b5

    SHA512

    7e12c62dcaef8c5aca0a90020e1a3ec891b153feee7ee529695179c925ffa2b52a7f62c37f2fbfd4346716a7d3a77b93aca64a97f861367f6da67a62cf549cd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aeaec11b01c1c6b3bf3cc828491e2be3

    SHA1

    5e125bbea869f3d674990e60b0cb1ccd52d90135

    SHA256

    fb7318a8b59c2d53a99a1f40fc69ff16dc4b2aaa75090acc2185b28ab51320fb

    SHA512

    169faed080a955cf230baffd0516d4425c7615afe66902ddf23e24d43842bca65afe22d952d3a9555ffbb92b51dfee6e9d77db1847b46647897b590a40e0773d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63f05f5574010fde3fe1e29dac1b607e

    SHA1

    fdef1746ec02e342d96699a53c8f06953092531d

    SHA256

    452b98c0b041a88c3d35ea2f1cd833ac4d52f7ce9debcc3f5eac0c3fdb9e85ef

    SHA512

    c81330392b923df7ea3b59f83bf84f7d54a8742c99734bb44d2a17ac661b0e49807af492ab8a620e29aeed52e6d4cea9150038b2bd6b57250cdb57f8cbc2b5bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54230cbb660d18d17ee2cdf9e5633a81

    SHA1

    5f05fe69e7cc56fe6fe7e6294cc76abb35660321

    SHA256

    de53e4847370140dd7cc7b419ea6a6956084b6ba0db1a3f887bd83680c65914b

    SHA512

    a6821c942d5fc8b36c52f1199481654bcf596e5ce1407a977c1cea3f750fe56448e8308bbdb3665f6d08cfa035ed5cc7eb51d5d2e5bb7881b4295c73883e547d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72573cd10833d3880f12d64343767b4e

    SHA1

    a309cda614560feb119c7b5db020bee844b81af4

    SHA256

    98fc233bce493b3a0caecbc771b36108f32a4ba2df903dbd43ee1cbf80dcaf4d

    SHA512

    c991d84d26772394085a7b6cb6675ce2be16d79248470d6a4167522808236b87b885e3ede4b6a75e47e49922cf97d4ca60dacc46ed45c8af7c7622f7b68c6f3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41a42fdfeb7266e75557108d030ed661

    SHA1

    cc68eb05a0785b305dda52d756fbcedd29e51028

    SHA256

    8d6e4d4c2732f827b1022923e174ba97874b8a1dcb6099bb93af0ae24f8e3c37

    SHA512

    a3c21524fc9c0957448200548946f5dfa3274087ad80dd992dbb4e853d4d2aebc42742a492cb72ba199d0a42cab39dd91e9f4e061fed7c05106999947cc71db4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f869a14f40bc045535342afe6218490

    SHA1

    825ef45c536bd0a61482c5c662187a898ec29303

    SHA256

    d088f1da1684a7566a94ce0f3d71615a1fb8755b9307780a26cd584e4c6bd2c4

    SHA512

    a3a2a1f0507bee75c8b851efc1ccd6e09d86b4a9911cf1db9086489fcbec1704da7c79065c5937e55d8c3c7095f6fc65c72cf33f0e2b4093b8591eef14e9d98c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bcfff87441d53c0939203e1e93ac3d42

    SHA1

    0a85449b12dbca8f71704ce982cc972c755c114b

    SHA256

    3a3fdab8a4b36f50c05d2ba1e33f5a9c16bfd94280080d36939f2b78b126ea23

    SHA512

    d3c5ca0861c289c990c5ad2fe4ac1487ac8f910f9f0d15df3d091b127d53c8be3b32447c0af08bdbf5c152180da706806c784b70907f66db3206c24da6890a48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90018d46dfa84d85559b128725c8b57d

    SHA1

    132bfdc79167cc561f2b3b5e7418637951b9c8f3

    SHA256

    56d4f6ce32a348cacfb11a7cc617c10ea3984d3cc0aa5f9e303184ebbbf5fb81

    SHA512

    a10db0f7e01f1f74756f152284ae1544b39e01ec59a1b643e2d84377779e0a11469cb420cdf577632af5351e4d2f35e3996ee9590922762a95b551e7b4ecc24c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87e7c71acf87c477b0778974f93fc319

    SHA1

    da6fe88067394256d6bf75a27d85177a01e7c613

    SHA256

    6ac7de003f91ed22eb41524c55e5539ce1560086e9ed313a3fc901bf8118e032

    SHA512

    7e37bdb4e118f3301f20430206f46ff254be221376c9b2ec31934469ff153a60d786806f484e90b9248be7840f4eb04d17f5b414c5357e89f724b405a1572872

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15d144c0cfe1608de06b7859341d25af

    SHA1

    6fc4872007e1c0797d5f210d88daa52c1a200293

    SHA256

    fc63e41a53af0a2c4e87d381f411c482bb307ad3aefd5445c93c454eb113f56c

    SHA512

    98c52678520e2e0443927fc78ca2e2350f5c999485867421d30e1071b56e1d88ac7fa0df22f6cb610b064ca7a78b5ae43ea1e73316cf187b3b4dc820987af34d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4f5c19dd407941e9fd646f691cd0999

    SHA1

    2255759c00e18a0ae5fdd49d3b07cbb309c3a844

    SHA256

    e92bed92bc4123e80d6c0d62e1fd357c2619728db30efbc41a070fecae020207

    SHA512

    803caee6bfa07f3585ee6bf9b6bc8c16ed455576867eb3cc4cf2e5f2958ae50dc97fd28a11d5b94acce7acd04e4a0cc5134778206fa536d3fe124b81ee3e1ca7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e11fac58a633ac8b6b7c579bd143c51d

    SHA1

    a2f1366710c76cc4f0b66253e6eaf3d16b0fd05d

    SHA256

    eb6e2305138b289c98b7012e8507477da8d2bc1e993248d64badf98dc75ad4b3

    SHA512

    13003c8ed53c068d5bc7b9b137a60285c09e6b67ebaf5343655d53ec593de12159450965465a77ad0c30ce64ba57420ac077930edcbb82f54344002e1723c87f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f1efbc2cad2afea4c42a8942b141af3

    SHA1

    8fe06cf55f0d93fe43db467210a4a0a869d5b9f5

    SHA256

    47668c3d87f9d54ed3eef56b1097c8bcb5bc60618dc3ab94bb6d6b56c436aec1

    SHA512

    373eb7efcb84168be3b07afd4062b748eb21a2d8dd91e1f9eaf62d07b6c4fad0bd1a28040d13ab26ac6ae9361d9a1ee064ee9d8313d262dc22030896e950649e

  • C:\Users\Admin\AppData\Local\Temp\CabCD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar18D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b