Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 21:59

240901-1v95hstdqc 3

01/09/2024, 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:58

General

  • Target

    Mod_1446523594_DubsMintMenusMod.xml

  • Size

    558B

  • MD5

    7485505b376a7cd48fa51c106eeb198a

  • SHA1

    b4ef20ebd592eb305c18e529aaa9e43c41f845ac

  • SHA256

    35a94dc1aaed7301fa98d8961037a319b410e35da50794b00358ec04b7c2eb8b

  • SHA512

    5b3ac690e2c34e5f1d181701f52fab3792c94062eb81491ec8c54df62672ed3aa95e3ae148133f1303baeec042b91fbdc86c44b8dac13ab967fa7768a51a55a5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1446523594_DubsMintMenusMod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2be4150f94159d501b64de570a614e25

    SHA1

    9472591deb273ee7d21a2e9f405238f525c7f5a2

    SHA256

    c1ecf4088daff6af0ea262d2b3e8e463cb64f00498ed51513cc92715ee625895

    SHA512

    f1f1a599ea7ffadda86b81cacf7fb1ac61043d0f1782f65fd4e795839d061f94f66d90756479d21d2f022e64fef1da527dbd719a89cfd6de704123133eb33539

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f074e42f1c8ed337780a8145840065e

    SHA1

    737d1e92d400182f87bfde36c4fc415f984d9206

    SHA256

    5cbe7aa7941c183363681a3b00d204a734b52e53516f7952c4d8f974da430150

    SHA512

    61a05a900ea748f3cf87d4004c100a128112eae72e35cd9bba26caa95bbb50c83ca4ed30a5577ea2673b0f386bf1e251843efa271a7143dcfc30a0fe0cabd05d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0d44039af50a58d79e220b96255ed4b

    SHA1

    6bdbff4fdb0a7bb882dece5ac5af72dee3d3b650

    SHA256

    77719dc2d22e5969ad60c660f6b1e4f88f51eea1af2cead6b9b5d0087f051927

    SHA512

    210b680cc4eb11b48d8f6c07bcf084e846e632421a8191457afbaa2461bb683d4a25b6a1310d60d9858811e97e514c56dfe8c25a4eb113bc93bb1bfd8fa9de92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92ee8235ddc5ff245b330da26bc40c84

    SHA1

    eb2870702b43b22cec79ba1e6ccc7f8b32967123

    SHA256

    c8467586ff6854eac01e56373823b2a780e7c78c5feabb7f3bb8491bb773f499

    SHA512

    6ba1080292174689a94f7245d7363dcecb1f8be80999fdc4615df2227ed0baf2d20b7914ca10ba65d65d6091248c40bb6952ecc1964cc3b409e0fb23af7cc441

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a72fa9052a254cf0c84f6721e1ee7e2e

    SHA1

    98179172eee65279b6d087b3fed3d410e1b0b084

    SHA256

    0dc8fafd3f2b9c8c352c04eb677ee1ecb31b9e238973e6ec909df9f870b90d68

    SHA512

    10f97dc9d898b24172cf9133da421170b8c19a40c604f687ea0848d952aae929baf8fceb48568177d5632a024a780ab4b405d15055c0699740443d0eeeac9d05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6a21dc5c88ace899067733fedf55c2a

    SHA1

    2faa0eafa0a90a6bd6a1eae23c888c764dfb9ba7

    SHA256

    fe47a2468a77c6e0858180cdd3563d7e96a959d8c04c17af2c69b15e603e6e0e

    SHA512

    ee0942780ab728b99d62e995d8d5318f189eb98843202189d494bddcab9a7f475887a59f2da62cc4ab5c88ce5d4ea6a45ce479fb43322b5db2b889924a1f63b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e93b123ab5f436e0f474061e4db7655f

    SHA1

    a17d3e154e5e261ea26d03b9d22d9fd0ac1e59c0

    SHA256

    14bffe01040d02839c039ab4a48265f903bcd6908431061401aa0cc6c7f5ff15

    SHA512

    d4780dba2bc32c190561d88e0d6898edc6cb91a1fa0919fcd3360ef0a772daeb662a31af84978ce57c0e65fa7aa9a08b3ae611453e1a8d6deca8c5c2ff5edcc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bd43670929827d70f104cdd630e7e2f

    SHA1

    f966fef1b9c467efaefe607bb77362e56eda3b90

    SHA256

    846249c53ade57fa5da614cc0c223fe8c7524be1d14fe1e6815cc1fe099622b3

    SHA512

    4fd68b00cb34dc4935cb5d95e8db784fe9eb88c1bde90495fb5d2ac8b7a8a2bd550909ae38d877d74dcad1b609ecfc63958fd7f5743c38726c59b5861cf2b348

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4a522b75025f862916ebfc79db19cdb

    SHA1

    1d8adca7c2029abf77a3f3707af957f039845bb1

    SHA256

    becfe4683bee10cc5c13adb05d483a424683cfc5f5f0f5d39560dcd2c0dd3f1c

    SHA512

    4cc9445f92520f4ad787098bdea8509c91a55094242b9a59c71b076b40da60e2697e4e7984929a76bf817fb9332ada64537c2aecd8744d4b045f0042983fa28b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4c9c18b712ee8b45ecf6db7b5d590ec

    SHA1

    ec5750ba2fc6192c0167bdc457e4e04254ec7f24

    SHA256

    113b9380c9996a673e486add415899b230e5787fbd2af8cd02eab9dfcf2a08c5

    SHA512

    dab29606a2ddd823bd2d915a6d98f10382d74f19f31856ef5fc8c5c3cb50e99405a0b0e94172ed2a8c7085d9714d29647c5da0062e16d23fbc6356700d2f4032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66220ab52f927cf023573e6d894a3de0

    SHA1

    5401f41df6b9c3fa486873b4941111f0989d4d4d

    SHA256

    c704e2617f0b8653fc293ca1fa86f911b82a4940866ae15fe220b3d7bcc40219

    SHA512

    4f7190f0a7914a8186f83863205d25b7030f91ace242b3ce8fa4fcb99fb68460c460346d1d4e90662c032eb5d3aae48c165abc897b730c50e69d4e1dcd701d08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd6280bd1900eb6cffc311ab57de0f76

    SHA1

    66bab53b4f6d6caa65d30b13525c55f616f90f9b

    SHA256

    5d09587b69f4c6f4956e925fa8c164f0bd23db1a2884c24559d682ee951c0032

    SHA512

    0c2fc2616c4171dd39545f2afc48bc98cc02a958ad8d02cae164f587ae404b775a15d75aad96d38c9867122f11ee82cb37bc767668aea6f79633745a0184b7fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31b6d9688141bef3afcd6bc3f99ea0c1

    SHA1

    e39a2bcb0f5994f91771a78233c44ae01c3af264

    SHA256

    8b3aa62958b90778b1cb253527611b27efb035dba85bd49b719e1c302f1e59a9

    SHA512

    311c4bbfc4b0d7be947eaa3a9314e97fc50752725b5e696500b223167f94247ca87b716de0e4914788a107f6819ebf3ee2b61e2cdde73199dfbd92c8111330b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bbcf98dff05bb895d6c804096337d58

    SHA1

    04cfbd535aaf56ea4b7e151d6896d76cb9babfdd

    SHA256

    bff0cb0a6d8c9222b502a6b0001c981e9f455fc7ccab6021841b3ed31ffff85d

    SHA512

    af0b012376f1124581466bb8cfb6e2f3997817dbd8d12d237133277b8a655d795f0ddac90be24e73ed9302a55d847ab13f67691752aaee2075a989c3a3461f3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    942352047355acf29043fd2117c9c5b5

    SHA1

    977d358c33af4a0224fe76d9d7493d51c5d61f5f

    SHA256

    7d74701b07fc667747bd4c7788a1099b8f39c7d6d91316879b8abe4e09a64bc3

    SHA512

    80abfd5272e3cdd58b1bf8ca0b0a45cf9cc5b468ebfc52b96e41319ccc609ff077457fd63e9b5c52c9f4b9722ce83f416a280a422088ffacfaee6b103069ac9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8c827189e7a23e2f10d9fb69b682cd8

    SHA1

    255555c0df358e6efdadb153713abf0ad1a6f654

    SHA256

    a1b7a78f61673ac120105d841b0131ed44f7d0ae8c51e6154459c0d5cf9e0578

    SHA512

    68b62c8e6bd7ff124985c77090c25e6e5ff12ab35fbb14307a3a744fb4e2f5d4a47860fcb420d2697ea14736e4f2350385eaa9a5c789ed3e79b00490da606f05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abd78b9abfa292d4a6e81aef272de47c

    SHA1

    5c7dc823aabb0da129985fe0554cb68bb3eb75c4

    SHA256

    b35fec8b295f9c882a718dcb380e81f6098691b3bba32494fb141900bd18ead3

    SHA512

    f9fccceeab63955fa9c667e36704de9e8c7b971bff1863d3b3bee4ce763775265434cde83ca35ecbb64e038cb4bc50d36d5164b0d3825088dbc4809c6869db9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f939fc3c0af8af8a05db5cb03eb5ffbf

    SHA1

    e77d87aec915928e39dfa75b61a1beaa0e506087

    SHA256

    1aa05044794607aea5e4b49c815878cc7156578486f244c4ef26bafcccd592cf

    SHA512

    98d0c4c8b19620dc49fe40f1d053f824ccd8704be26ee0ccb4d1861de2825c0bf3dd86d921a1ba042ac2bfcdf7bee6eadc4fea2ed4e9f79c50f5ea652cb4b57c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a09bbcabacf4e4bcb9ad8fdc1f862a02

    SHA1

    bd531da323665e93d1864ecbc07d06e39a65fa5d

    SHA256

    8c89558b071f5de7f98d2717946387c625e1119b43721f6a24f7f174e5d9569f

    SHA512

    5e2212cb00c0575ed4173cd0d8afa9bacb66706fd959f349c517547e8aee51672a1e8c68b3ec76e74a2cccb02137519bc0bc2c50fb0f77159c9cfa936798bec0

  • C:\Users\Admin\AppData\Local\Temp\CabA729.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA7D9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b