Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 21:59

240901-1v95hstdqc 3

01/09/2024, 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:58

General

  • Target

    Mod_1504723424_SmartSpeed_Mod.xml

  • Size

    323B

  • MD5

    ce411b71d093cf9adaf663ef788c5a22

  • SHA1

    762da0075d4647c97527f2db31f3bff865fa74f5

  • SHA256

    e6b0d8f01334c6a786209d193876995617ebb8bf3b0aae81edf9e59a859d6840

  • SHA512

    95809e9c9fe4ec42d82293ee78af290add37e94ff43d5d377612a40c123781f4193e3852d3caa2b8aa7c592dfae08dc860cf581beece51ff8bcb953e37fb2c8c

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1504723424_SmartSpeed_Mod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    465008543c5baf065072d37f0b9e0e95

    SHA1

    532a3f15cd942e528c4e539d9a64f37c8585414c

    SHA256

    b07bf563884fc522f2a3ee13a765d7d82106f25943dd520e90c8e9c1f713442c

    SHA512

    cbf9849c8a6bd3e69b72f18bacda3cee01e4556d418e6e6f4823feaf068ea927224a62cc93584249e8515d02e62ae45c1b17cf33d88318ced80b11061d9d585d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4659507cc741d1350da54f0fbc7ed057

    SHA1

    8093aeea313d3e308f102d1d64a1da27f09a5955

    SHA256

    7561011bc8fa7f960cd7d3b6705abcf2879e786be19b2f8d15772d7f7c0faecb

    SHA512

    772c9d6550314b0db1252cf8c3708be0ef30d44d5488062cc0cafc117e2c686ac163c856a079a5cf6eb6e21714fb122046aeeab32019e3709125379e1154b627

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1db94c8a9bb1dea4da4e8e2f9076448

    SHA1

    9a6ce70b0ef1d7fdb4030a3ed4b872a1b9732bd8

    SHA256

    319ebb1acbbc3a39753693fd48fe3c6ccbc4182243094570a6fed348bec91ca9

    SHA512

    8e8e48582a408cce8c42c34ded49f701ef415999efac483b09a3a693521c74e1b2471b02a3050503529b4b4ea60eddd349f9e99358bedb9f7fe76a287c1dc8d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    106c0ef097c1bf08dc1fb092f3a682ff

    SHA1

    aca83a114e48c04e753dfa89d194410228b87296

    SHA256

    691f10919e08877d6501ede1f1f1e4953ae6db655b975e1871a42be2b59f9765

    SHA512

    43469a8ae2286f07db1a18d5008d1d4dae2b0762124bc8944af8b1adc0a08ab143a77b7f9a273aaecb3c9794b3e6c8d8b2437affeb49b782783a835d33fada28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86d2a07dc89871689042ba6e11373c25

    SHA1

    338d882f4f6e3b682e8617c960892c965e06146f

    SHA256

    752be7853115f45fe460ccf04d504083e6b7220e5239114fc2505b6af0330390

    SHA512

    4286a5b9aca455388b936aa7ad6aa60b8faab894f8684c37710290ad75c19fdf98970e9fc2c35ce86314d0a30c2bf4762cb462d57861f44a75faeaa99b5e8aa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    439a95cdefc3f87ae38c55241522906c

    SHA1

    32333163f975e6a0ab69d222e3743b2241aa3899

    SHA256

    7d2f5aa7c9317ea9ea4f756e792d09000154f2721ab3b1eea6fb34c539333c20

    SHA512

    4dc35af77eda428531d881de2f59e44cdf90a82418584c9bc374ad5be0cfb8dd8de28100dc5f3f3d83af8dbf0fd7e2f1aac9844fe61fc798994e12c8786959f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b93dc9fe1f3fbb6009573658ddffbaa7

    SHA1

    01e4000d218bebc7771580070aec14c7d0200857

    SHA256

    1ad91f058ef417547c677fa5ce2e59777ffad7040e81e57177381139f850510a

    SHA512

    cc358f7782aa774deea53b45e4a0c2fd77cec611f56b54c57cee6407e415c978ab9a66b3e97d30d21365b2c075581b856183f4489f979a7456392e21ebb93e2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee5bc0ec90f0dc7c055b3cfebc534fee

    SHA1

    4412892f464c3d7973567ffb4cf8bdf76bc7e9fa

    SHA256

    3a6c96905e41bfb4e75f7142b73d25486e26fde2c4c5e6872eb790f6e5ec091e

    SHA512

    8df19dc453389264193a4e6803eb77e17ae7d4b4c11f7b97dc4517e13dde734defdd32e572a26347d5d15ba95d7e9825772e1e8c9215ec707ab4f44ea7b7ca66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22eff1b03c0a95e45caf202a17c06d65

    SHA1

    11a5959e8c2cca1ee725e5725bc38f0c6f640ad6

    SHA256

    aad4ccca79ffd791fd879046aa17472958d4ba3817230b7e60eff6817af624ed

    SHA512

    f67cd4740222ca906b348d796dc7b8aa0220603dc8c45ab0a859311ac4051f32fc73e6860405922f06c3c5f5f69756dfadbe681ab46034f9eecff5808740e399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    050ce705916b4fe0a3bc5288838075f1

    SHA1

    b57ca74ed16b59303c7b20640052bb4f2c5978de

    SHA256

    d17c7aa378074cdec160acbc38cc9eead62eef4f0666d092c474ba4540262df4

    SHA512

    915fb3bf40556095fc6b6b31959f1534c463e68bc43cfd3ebd548db7f75daae0803bb3e5fb82250ed5e7c62c5f8f74506ccecb992b104da8f25def75055361f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d94daf068d7d3edfb7dd6ad9bdc7fb48

    SHA1

    89d1abe9e3a337411b4fe0cda606da5c659dc435

    SHA256

    350ca2229e0cb84a0a3cc189c907550d85a6293397918e3027df53fa124a9c88

    SHA512

    17d83438a3bd80fe28ef66a9d9e1cfe77fcead504e8c108966b55ae8939744ae2acfd46f50e1ba69250ce7d6c0dec452ba572f113cd9f996cca2270328b4f3ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c8474016c2d9376b467f9e8cc81565f

    SHA1

    b3ca0e289ff2d813edff74f2f6c543a6e9104b8c

    SHA256

    4685fe59a2d187fe1e07899c00dca7bb797ad514d9a69cb32d7ad0beac01991c

    SHA512

    bcc846eb78aa5ebc84ba46f3b9f32aa06aa12692224d573965821dc172613bc9551d17fafa9f9aee17d9cc5564d505d6c5040b6593e476c208a0592560043dc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f888b960827744babc3dc18d3ca60b91

    SHA1

    6954636ebb111941eeee75019d4cee710bc29f5b

    SHA256

    8862dea732435fa89474177d3436dae59d0c6d390fed8babb201450494d2c0fc

    SHA512

    38430207cebf01b479cb0c13550c5fa66a4cf152455c25b80f7fec84a32dbba91c2216f6a9a070361c626952a92565fe04fbad99504d1e2b6fbc3a6fc0ddfa3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a445a33fdc703c5e9d008fd781e649ef

    SHA1

    9749918c7994961af99990e5397a2d10ec916c34

    SHA256

    a7b01254ce9c2fb02242022e420f5f7d05a3d889ecbfae65d2d31e27006b8f12

    SHA512

    9c8201878789ca01d86dc903079acca9ea8c91ca952f2dff86e502d71eed725b69a42963d896bdb58ccc265568a230c2e02d63497236deb998a9a74f39b878d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    049977f516ec8ba5212ce33cf11a5423

    SHA1

    e7462b949792cf83308a804ab33fb72332a02fa8

    SHA256

    8ae5d6817f0c7cfe018a096fcbd422303f8d6b2a098bb648ae5ddb12a8752f64

    SHA512

    3ba9fe08b882707802b23c506b6eb029e460ba2b5c4eed2009e2d10277888e1c43572661f5f253e443ee823b636c7707f0a08062c644e63ddfef5628858b2366

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e272cb92b572b52b1e5b5985d5b678ce

    SHA1

    ed5a05db5eb59aeb6548a01a38e4b483798b1b16

    SHA256

    778943ee8a365f530f1f55c7e14bcc0df983a5ccd6436469359fb8c88496d3e2

    SHA512

    cefaa33c6e7750fda9426e61fb2f714bf76c2157eb23591b1d169b22723130cfee8410e49bce749b7d63dfa40f77d7d5565d281fa373dd32d95e6c1e7ae4c1d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12bed979400137de9a3b8ca35bc90e52

    SHA1

    40384cdaa3af54096bb56c6b20eed0582bea3cd7

    SHA256

    3502daed017cfecc8a0435b08b15a914c201526779d1ae812149599ebead1a4e

    SHA512

    16e8b8cfeb9e8a46f9c07d7f7a1a03dfaefc6c817edbb318a667dce82a7435471aa1b05754f58592af02c10a1db54404153b7c5f8289d1bc3c21b7a1e018d53c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cd0bd72cd162b8695d2d3cf52304ef6

    SHA1

    6476c4d35bd309c87eafef595504bdcbb173eacc

    SHA256

    9d05a767e87cbadbc512cbc7640dfd474241fee12308fd1b8eac36d26d5f0d67

    SHA512

    edb099246f22a4735aeef8e6cdf68ab7ec825084cb705b5041df861bd368c4acdbc4b4844ca4c1113bad0d014fa39783e8a618198ee42a3b1a8be9d4e8577f9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea8b27fea4113dadb9fc72ed883ac419

    SHA1

    315cfcb4716c361ff6029aedbcef9632c4cbec62

    SHA256

    d30b98446b0d9023cd8f1d720175be95523deb4643549834ab841426265b5954

    SHA512

    5ace2afe426eac1581513edba4cc77c017e595502f11491402bdd03828818ab01e9faa9ba8e52b7d1fd5d2d26f89cb40f950e48a5f3e3175cbeb0f74a7b20fd2

  • C:\Users\Admin\AppData\Local\Temp\CabE5C0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE630.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b