Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 21:59

240901-1v95hstdqc 3

01/09/2024, 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:58

General

  • Target

    Mod_1372003680_Mod.xml

  • Size

    525B

  • MD5

    62085633b3652ba5143988ac994dda2c

  • SHA1

    d9b84bb3653702eec6ef82fc6771bc7defbd2286

  • SHA256

    51741b3237cee13c6b6b0d7fca4f96f29f86da52a03262e46415b269d4000c85

  • SHA512

    1d6b9fdad3e87c33aedbf304191ced05851fbc5f5ab0f86c07e3aae60d94a238df5ea9023475c449de3b7c865b35395068097521e7394eade42856f47407bbbc

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1372003680_Mod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dbf8c5a10c2265241affec700562a2e

    SHA1

    c09893caa0cacc30bddf5becb84a6958afac394f

    SHA256

    8de3acdadb0e6734c0269e813d3afb597766441c2cdf32af2b47a69aa48beb2a

    SHA512

    530a06e347b58f5712c63b79bf4aa6b2ec5c53c77406bde6037c46a396497771e4c68ca96b9de280cbdd47879465f4dee2395e51690d671ddfb1695f275f8e0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baeafe8c471a5aeed18e00f8e94ce15a

    SHA1

    ceb1e44b94c4e4cd3647d07713ad33d0a9353451

    SHA256

    ede8d2e8706ecd272134f0f8acfb0f4b8b16ee2c7d0948cb46748f97097ff943

    SHA512

    06406e03a3c7a6709bc03f525163c3f317ca2b92e515412168cc68ed363a982b8d75153fb2b1539b7f1031bdca0ac79943424b1b4ed2235ed79764f0698c1926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d101d3362e50b9e08197a157d17b605

    SHA1

    9105c8b1495030dd10cf081dde7c7b1dec698211

    SHA256

    4d51e673e45cf93249ef3456d1a82a60b504ff670a02f3ecb93eaabda23cc06b

    SHA512

    8b3e498f14a02bcbe891654f35250af9fa2b5607b0e0dd412fdc451d432892c43907ba9de03e4275feace293f94611d9813bd188fb9f1859823f225236899c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f827f8a706715310669082ad1f55517

    SHA1

    41f3f3bd5317d61084456c372a1602862b80d832

    SHA256

    b929e9de5330974f95844df7232bbea562d240b0b67fe19f44dbda15cbb5eea9

    SHA512

    e60703c637a6d59389ea53f62ba368d6facd727290b35f61fd7a3d1b0adb874711456a2da132ef08bb48e66762934eb8d4aa3232874e73720700dafcadbdd409

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ac4cdc5731b3931ba12a2d94ea638ee

    SHA1

    1287a5c062424d9be8f8f74d8d81d258c9f9b4fd

    SHA256

    178dfbbe92d1a754d11c4a799dbdd3745d6ce379353f31610bc70ec3d70ab6ca

    SHA512

    58ee379ba6f61c1d96b6fbd44c30ce67525d255b0afb864508db19760ca0a5f954e030d4935a28c4cf43eda2f4e61f651b5037d00432f97b3e8160658a87e020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79e0f1c87aa6ec1a07c2139e6fa164b9

    SHA1

    08f06fad30f6ce4c90fce4774a9a6a73313fe0ed

    SHA256

    2444fb98ff91f8d602630fabca0a6eaaae15c14816c83b4e6a4789f82bae15cd

    SHA512

    61af753143868031f04d91d772e51668bd19974209fb71e99a9e2e113c6fe6ed803edd049e7060443e633778cd51edf464047ab54f7b8ddcfa89b54ebd15d394

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b1381a78233ab6063182fe7ba70d4f4

    SHA1

    53fc1c0c329a92baad06f449e281731c16482fa1

    SHA256

    9542e9c2e4a8b28f56690341426083fa92fec3477dfaa38b8dadb1b7739ac9c9

    SHA512

    decbf463181d2fe627e1d5992453ee8aa7bda541a1a983cdf8d7a04b868722a0ba41d3d5e447c58ad9ce5ab48f7a01131b87f05221454a614e396d7755033f74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58db5a1ea5943ddd45bf19421c0edcf4

    SHA1

    3b7f0027bf0c92c6b42de14b8d8f610b3378c4b4

    SHA256

    193f22ac0eae52172d892632cc57eab04ea189412fe716cac19fcd30f9bf4c1d

    SHA512

    135a6eeb2f190fb8ee169938feed537829ff839756cabf4af5565b6b76112f6e8e46aa26d3469473ac47a49c4143e581500c9626f6749843f3b70755cc7a4e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edbd0836b3ae11431fc8935a5103b129

    SHA1

    711b94daac69ff85990900b0441ce33d8d7f6aec

    SHA256

    63f6130680dcd7412890fe3687729ac719a0e81f28deb4b7e0862960e09c0111

    SHA512

    77c4bfd05bfab374c12d18e68481d33c04775fbcda07831b168476cf735ef786cd8d80f03b00946a744fac7c34899f75b164009410423e6b40ae19c5a57c4230

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e46fd24fffd0684f76ab5c1fff345f2f

    SHA1

    270fb5a99ae6925cc1b62159afd6f4726c23e69a

    SHA256

    9e9755f6b0f31f268e85870daaf306b5776e210be4689c37d14518e764fca7f2

    SHA512

    795d96b95b1ce74533d9ca48e49c0d7f1371120ff1d805f57c4ba54fd59dfed456d384058eec1ab11f66023daa59c58f54f80bce947b6e5132d456b402afd9cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65bfc45aa7d826a1ef2369458afb9e16

    SHA1

    64452ae11386e0480401455028623313ee791b0b

    SHA256

    08bf1d96f25fc989a696a62847c7f5cb57de0d0c46bb47902fb1dbe53a4e2ca3

    SHA512

    434de712c0bac2daa2aabe7868d60fc58dbe08401a02ad169774102a88cd46c0f559fabc1f2e9d485dbf43717916b31f12da5532a766c283c2859106ee0fbc64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bb053ba9100f46468cb288b96d8a06f

    SHA1

    db73791238184dec61d96f1a794a01cb8f410c64

    SHA256

    3d517b3fef06ce3060b6e99a3f6a9caa9271e11c08ab440236cd04e62958fee2

    SHA512

    1ca95b620fe84b641f7306e73abde9425fb182369449ed6dd4f7482164ac2e8502eba2d49977c738b29ca496455dd675b817030a235a3cce6c40c88ff04c9428

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14f77c567fcbae8c70d7ff2ab52883c4

    SHA1

    38f12e914159c174264df6209afe6ce5717b008b

    SHA256

    d0f2e2607d227ece98498bf7ba56cbb236749587ed76d02a3387079fa3cc293b

    SHA512

    0fba394bf6565e544c0319ce64589e2aec1c79dbf5926baf13bb75126345d8bff9981977ff7f24881d95625299732f717c1a66e9e9d7c588a8f740a7e33d4977

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01c49a9818688172b0316d066db7419f

    SHA1

    8d34dc3bd8b2c42722963a1197cfd789b6f950f9

    SHA256

    8c2d4052dad88105be82169df70417472888ca2d9655fc9fe330b2c63592557b

    SHA512

    a2a0bb3e00300e46057fbd2d650e9716063f312071b5df3898238594f1f063237a72b0d75955fa75872ec12b1c04094ca754f9e0699630668f824a79bbe1a179

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    784360e946a1c10e575bbe5bc96eb3b0

    SHA1

    63838468e85f081ceb58a8bd4275349a8f54ba6a

    SHA256

    84fcaab9335d6fb11961e6c1aca6b0a417c0cc5d885594f16c74b0db5cc671f9

    SHA512

    f0ed87c4c87bd4f8a38815c412a13b8275b7fb8eba6c1a6585abf1d4513d160ff6e7af58908b5625fe1a0534d358fc8b0e07aa9150c9d1fc5a5d1042caa04778

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f3084ace3371fca922aa72626e707be

    SHA1

    64d2ef8943030af8553b917f3bca38490fbf2927

    SHA256

    bcd451e155104d64923459d5f90caa7cac54673e7d64164129a54c3b02dc505a

    SHA512

    ff3e58de73a3fe7cab00d9ed9b02e0facbd679e59358ff8c94c188e8477e1e38a055b4e878ea8be6cb20d562d03e19056715fcd704e2a2ecc67fb3c32d9bfa34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92ba20f1405b170ed442586483bdbbbf

    SHA1

    a24d5f21f740e6efb2322c20c2b55d51adb8b9c0

    SHA256

    1a2ea89c503f0ea27f29eb92c07919eb90bd6f56907ba8cb8eac6dc3e2b63c80

    SHA512

    71bfeaad98776b831f75289c1a46106f0ddd4aa8f70e1f16b3c2b6bf53aa444c1596c4c91aeb6f511c0e363c35798166ea300b0741bdadcefdd8e80045d88d40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65699fa61037d62d2798e8571a259772

    SHA1

    2ff45522b6643670af80ba3c2789813e01bbfd6f

    SHA256

    5b214c25b0059ff8953e4d107f03423a7da71407bd4b22728156d8f56760ac76

    SHA512

    18904d80e21f4e67d3a0d405de42ed5d289bd0d42ec816fa665710179ef223c5b5030b495954c023b1e98f59777ee0d6cc1e327621f63e6e92ea61074512a95c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3b59110475f9244e04ba30d69e8d9a2

    SHA1

    df06101ff965f9a95fa42059726442226512e91b

    SHA256

    f3d7746233d1b6fd4b8b539e49eeeb4ad963a3679a9076eaf08dfa573c7d5890

    SHA512

    62ebd8dbeb0c4fc36e1659a78b1785f4a944c73031778d42a7f4ebfbe48c53c844101b526a7cfec624b5141ec3faecc1578d0ed08714500013eadcccc85dda61

  • C:\Users\Admin\AppData\Local\Temp\Cab6E7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar757.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b