Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 21:59

240901-1v95hstdqc 3

01/09/2024, 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:58

General

  • Target

    Mod_1541721856_AlphaAnimalsEvents_Mod.xml

  • Size

    793B

  • MD5

    f628a8103817dfbc8b869ab583d5d518

  • SHA1

    c75f3df99f213f312965983de92ebf384325c2b0

  • SHA256

    fbb7a255b4c4ca11b262d02ebe1c21c034da3f5ae893680c52ddedacff074073

  • SHA512

    c8dc343c7acafaf0a339060fd062d9ee7afd85dc7644c57401f273a930e286cd352d79cfc88c959e16406b58a249cf8b7d0171ba0346fc5631fd181e3eccc960

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1541721856_AlphaAnimalsEvents_Mod.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    21e46dcbf8f8bc95a47583d80ca5d3e9

    SHA1

    9483d4adf12999174e60ef3cb7f2d68f13c4adf2

    SHA256

    d71b585b75a39db9e10bfde527d6fbf654eb3b4a0826546945c6b82854c2e1e9

    SHA512

    2f17fd9e084079bfb954fb33fd8a1906c2ff28428aa7fea826e9d9bd04a67a4d5e61ff2f77cd90c1c66364c3a9e7b2484a6bddda48cba8301ed76c4464ba9a62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5f09aef7b9b381a8c202c3b523faebd0

    SHA1

    a3954247ca7e249523d8f03af83425d97286a464

    SHA256

    83d6fec09bdde5d15c5248cfb6be3de3f2e6f1295c325fa50a76584a0f1069a2

    SHA512

    95dbbd5b31340b3dd9ababac31d00ea7c041215e8c880e396758dcf53e96ec49906a4de2f717d74ad3747db94b7a9dc0e34257d8bff3eb83a98852eae79357aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    126919a846240cb4bc94b123ae49d9d1

    SHA1

    8127d7aa50bf720cd133a1a8ac38fc6104591d29

    SHA256

    de7aa3c370a18ab69fdf09e029a635f20257b2cf98629e604ad5be89c5d5d4b1

    SHA512

    ba9bc3ffb787e3e3c43d09614eebf708570c0ba3a214918502659010719b64be68a0b8549cb0b0a157f6ba9ce0ca3fe58363e2e6100bf29dcda4d2d309133b1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f205788e42e8ab83d18169cecc88aac3

    SHA1

    eb0b8629819e03a47e10f5f4085e58d874702be0

    SHA256

    3ba540e710df9d8a046dc7de15998a1ae6facf812933745890181caf04dedcd4

    SHA512

    3d4a335ec8558d4c2c5b23d22a2d83dfd3521690a459baeb7a36230071fc3bfaccc97952244c879759d0cc552e767f71b991949ac61e19cf6a1386a8bc83447d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c69fe29f179419fec01dd691bb84a18e

    SHA1

    42332ad2bb8761710288830dfc8a914fb1b9a05e

    SHA256

    319648277aaf881e78343187d5f044012157d292cf0007d04f4f7edaf00895ff

    SHA512

    3560ca184cf84ae0cbe8d37696ac50495a13bd3e56a8d44801657721ee5628789bd7c1bbec53e74dbc17741283d9ac061622cd2bc2d23abfac8b1e7bb87556ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1cc336658af796555db8526b19693bb3

    SHA1

    8cc8ce8cc63ff2efd15b769b372758da963c57fd

    SHA256

    bd155414794389cfc93177801cfd05bb0ef4b7eb803270246faeb31612bfa2a1

    SHA512

    29d91f645b3e431176e31357dbe3e41436952a702954f7f1203679a380d0008f0e0e0dae50c00fe31837dffc144b641126af6fed07b9c8db2f7eefeb8b9d4644

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    adf1496c498ad151926c3067787923d7

    SHA1

    98ff42cb4fbab0db56ba78626ee6dd3686130b3e

    SHA256

    f85c57394a96b087bdadfff075e52f711a4ee20ab9961fc2f1648327ab898d67

    SHA512

    3a18c3389834df64f5a81646d4f1c7f92c20a627fd03b0e551c619724e2b5873ff89c7d124a04e05111e9b8a8771bc1b8af3d11eb7fcb6a8c31253071c0538d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6a4022f49ece83ddef40e11d18d2510b

    SHA1

    a2d9be9ead27737518f107aed9a70aac3ab0582a

    SHA256

    98a844f5995cba6d359cb24989f79500126d043fb5c7c1ff2ee1a8c9b15dd0cd

    SHA512

    77bd77547051a67dce35e4ccf62aa74cd1f01543bdd2716336747486c16cebf2f486e6ed9219117f021a4f31075c2a2504c636df8d0e1a4cecaf6f644497a5d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f57d8622006b6c5e416b78862329c614

    SHA1

    258aa08f4fee31b71d1cb4561b2ed111a74861c1

    SHA256

    f727749d3e9e9d15bc7e831599f932c512efd4b87f738cbb79404ca078d3e32f

    SHA512

    ba1b09860de1eba48277457de8cfa0b3a1aed85098f6054a644c4d6b0e9c1d983ddb9fb6955bbce508bcd6c1e726cf04840d30a96bf6e50be5b81a5f402b61e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3995b1b97d145db76c1022909d6fb28a

    SHA1

    80b8cb0f108c7bef94fe29d29d9387fbd9551ded

    SHA256

    d4d6b4c25ab9e6ece8dc1c360536d65a551529adcaad02f03616ea916eb4fe3d

    SHA512

    24775c4c576a12f5ba2a11b4b120b134d51926950c0ded07b59dc38df28287b9d7ac93eadb81192eb8131c8822bda512c027c6df6dd87588e92b73b3fc3169f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d971ab4c6beb40f1bb9af76bb8e882d2

    SHA1

    daacbfcb15b937a0460351b55eca69de31ff49b3

    SHA256

    250183bac618b431d31bfed5b9e002b9565a924a6f277537108d78601b1fd42c

    SHA512

    f99e471c4028b12d9b3ba0532ad6767a89a35a532dceb33db24ad33fc04d61733c05d406080c09fe7f7f78a2c598a5e0a539d758636b2033a408b17c15f4f7c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0dae2aa4423ee8cf4812095929fff7f3

    SHA1

    07f743a0095162490646e80babb225504ac757d6

    SHA256

    3b998dc75c5976922c094b53cd1dbc3dabec751a3f9fefcf6b5e3120291b808c

    SHA512

    cabe88401fd8a7411e857691ab36c7f163b9084bded5fe6ad5e309ed9643d920a255f7653fa61852880c752f8b3b7c06fc754b62a55f0196846718fc59139556

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2a0ca4de88be30073705e7b87727dbbc

    SHA1

    91de59f56b94502e35aab6db0ef481297a871e9b

    SHA256

    99985d407965492a3da47c4dbed4334ae4eae1fac15a0409404cfb139ac3b4cc

    SHA512

    fec2dd5d75cc97a3e20ccb22a9ffc0f3dfe5783eda977fda8b63bcfc2c00d268ac06aa2a7696deadb50c5ba48234dc8419494bdbdc9f015613863835b4f8eb48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d3d5dabd0aa566656031caa433199dd6

    SHA1

    b024bb096b11c4c7e3542c00275655d09b35aa6d

    SHA256

    3ff85f82e1290c5516693ee49a5a5aa844b3085e21342d55d5f0172aec7a30df

    SHA512

    453c3318c103e26e3a17a590e710c6f9e9c3511681659798cf900cd7b4229f81d4cb5ba19dcdd96d129c0e1d4f77d93eb286227dc93fe02789ab65a2ad7152da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    376a559e454e1d89b9d5a79ba264d8e4

    SHA1

    92509df42a6b91e0450c1f8367d5f2c96aee41e5

    SHA256

    70db8ed9ed0665fcd255a6ff01078e653eff3560b42b4d9dfc436853e1889adb

    SHA512

    a4a5a3f42c6f16e279be81d2abc9e784b7a80aa7e48f72120f908f89b686c3ca9ba8e99c001e1e1cd1af254aa46a5078ee2dcf72f709700581bce1c58615aeb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    292f1586b4ab72164ccee3d3c6ad148b

    SHA1

    7ec4f554622eb2ad9c1727d3cc16b00b48320119

    SHA256

    5cf1123ca92f5eb16de2474a84c36c5c7165188ffd9a84a87c2229eb0aba7344

    SHA512

    683a7ffd44a522d17e81c1f53118121b819982dc2cc2e9e894c6fe3006b68532a37feba1fcf8379164e707380a6a8a4bd4d293bea2064dbb6518d0260e5f6e22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a0803afaab04a196f71cf5c823848cec

    SHA1

    c582dab666afa295848311c3959119aea86d905e

    SHA256

    c88d1f536affd59a5d630c6920e23a44efa8772fe703213a81d948fd61b7a371

    SHA512

    82e4d1ee32ca66341d978bb014f548d27597e81e7e00f028d45edf956078ddb8d3254b7699a7b478e51bb5b5072d4cc41f598697c18d1f77a5a82470c46d1ab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    70a43b44cc2c878b0c2173d84191deea

    SHA1

    7a57dff3f983a366a46f6d5262a35971a53eba7d

    SHA256

    bdb98379d3c1bd4fcb4506ed360f2b489cecafe39fa07c8c5698cbf0d766fb49

    SHA512

    390d8f3b4e4fb5bf01b5a622774ba270e37cb9a038b2d8c3ebdeed456cca4358be7b3e30f587941fbf3bab128babc66f21109ae485494ac03aa60185ac597acb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    950806df397caa01488dc340ab73293a

    SHA1

    49fe3e8b6fabec6fcd69947de0ae0bc462f025bc

    SHA256

    d3f5c0ed80a76ec7a6c2cb7c1f16ac44d1455e842f45d1fdb2ae5eb8f92f6503

    SHA512

    66ffd358cf138ab00e8eb4c05b339cbc3314fbdf72c333add6a71c812ed59f0ff4a3c88e30f81a61de94b64ce4094360345771365e1e03bf63cb13287f169a0c

  • C:\Users\Admin\AppData\Local\Temp\Cab7AAF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7B4E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b