Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 21:59

240901-1v95hstdqc 3

01/09/2024, 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:58

General

  • Target

    ModSettingsFrameworkMod_Settings.xml

  • Size

    5KB

  • MD5

    29ef81d2ba41b405f6e35d73e217ffe3

  • SHA1

    9113df49e3551e15ff95e3f29dafdd5acdb1bbf5

  • SHA256

    5537055a041c6d313c9f40888117b950148a02ddc7e81b058263205bd4a9a125

  • SHA512

    acb71dfc3f5bd5e5ec949166f467ec8385febeff42c211d66ffa5c3b0096c96d394105c4680e29baa6f577fea727dd369d15bbe75612952c0c2867f94462516b

  • SSDEEP

    96:gqjDBejmjjjXKznpmHFKzsyqY/tO7Kxiay38Kz/KzycKxBOCySjXKzd0Kz5KxtPF:7DBjKSFK4vY/tO7KAaysKbKecKbOCNKI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ModSettingsFrameworkMod_Settings.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2088
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f53acfa2c5ca5db0fad68ef5fe04981

    SHA1

    cdb9f7bf0401202350c126736a599d1e0de8cad6

    SHA256

    728628cf8b14f47e3666ff1e9f10cdd4b410062f24f3293f6354ce9ba184ea47

    SHA512

    ced4c55b07500190cd20d4a413faf818a1948dddba551b416351ed47d9892912cd9f45ae88345a9a23d7f570d425e963e8525590c262ee010db925d33123d319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    348cdb06c21041e2d25da9e2659597da

    SHA1

    ff2a42c68f0ade38c4eb8adb7785e53efc7017f2

    SHA256

    ce461b6fac5159108fb3aae99d19bb2ee396e77d1b9191107ae743555d26eed9

    SHA512

    8d891db2d480ff270bdca6741dbdf4bbeb9ee5ac72dbd2cb28adb7af94f405614ff101266c8c9a2f90b1bd0e7b1ea430ee2e4ccdc893608daa33cbe1faa6ece9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a94d6deea5e20470c28d522c99595b1

    SHA1

    3cb548187950b416361163ec508975aab2abd93c

    SHA256

    d389687cca5205f3938f1d427917046bfd11d516a4d20c5166494b4012ced784

    SHA512

    444dba9a7ad3608f88874dcb11e3c6690fe2a686635612cafa68dc01b4513358456507abe5a570ed0148029c2e5d5b907f8b481881ef82c6d8c0b7d2ab044e7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28f827367a9cb82a98235104864d09f5

    SHA1

    76beb060224a08a23717dea062c9ab9eb42e08e2

    SHA256

    dda3c7125aef3c6bc377736766650dc9801e538019c57137cadc90ef6c3339b5

    SHA512

    18fec95a27833bbef36bf9919ebd655617f4c6969c30e798a895129bc1ea70411ee6a30fa8f265e7b87fe7819982b85c30ff6021013c8f83374f84579cb8920a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fee80215efae43f3d112e49ff7b8f2d

    SHA1

    799bd5e402a6340650fba6d103a61715972c2c50

    SHA256

    ef8b3faea7010348ea0ea9acd2633ded94aa0720481e1fc370982b5166ddce79

    SHA512

    90e1000719738c096b14ab953ea7a3810ea30ae0796e27e15f969ab8080786d2ba5ea5529ee6112a1b3cf8352e0bb270050e3d230bb8d5eb6329afc6661a6627

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80ae5d179b12363d25e16f88ad9d67c0

    SHA1

    1fa7efdf0f3add05873634d8f0cc136e00b669ba

    SHA256

    ea02d4c337a7467f6add79780f58e4f87604e666f5358611765c6ab351ae1bf6

    SHA512

    ba0729e38d793223802e1bb79a8d202ea50ba4d68c1bbea8f2bfed1608487a7674cac161490271e1401b80af3768336cf817c5beaf6a87925455234cc075396d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1553c29803d1c13c4755e47fb1df8b6a

    SHA1

    b2c6af2f0b4277e8ac07c26b0929d813253eb6f6

    SHA256

    7ec64ac88ef36d83b18566a8816c15d1ff179a0a18fb99938b8cfdcca38b3abe

    SHA512

    7cb464d7f23e87da19dbf9b9809a9104c7c6c969969dadabdebd2141ab23b8a944ebab8e58b2f4533eb11445180c5e4e757b25b358cd0694234b09f3c39871aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d2124eaa9a9a59e8addd5cef53d1d0f

    SHA1

    1eff0664d07677699f737ee278413db6c5e3957f

    SHA256

    7e81311f37b74d1f62819ca6acda33e646265f92f2c15d4d316a918e3209f7ba

    SHA512

    f44843483f715df97c3d2976b4a5a16ba02ffa13f1b3613bdb2a7b3104643ff8fb9b4c1a612c5ebea060d82df8bb3f757adbfc1e07aab79cd5fe27630c7443af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdd294ce87769216d226b99d745d385d

    SHA1

    b5c86247dd88dc6b965f111632d1f90b63d1b68e

    SHA256

    e6a85e2a2589c82342b6c282b8ab412467d91ba67b102c20d20ccbeb0f0745c3

    SHA512

    243eb2626b7fe3ee872d1b9e3e96ce267b1fe449d2ea6fe8209baafea53e543513b0a47641015581c282aa10df2fad0f86412df394d6db7b148b4a1e32782aab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f34f106a17144221460094b675474455

    SHA1

    ae6eefb05b354db0933f3239efb71991bb5cf6a0

    SHA256

    7fa05882721fbe31012e16f554b21c69d6acafbaa3fb673e6f7191da8c938a14

    SHA512

    30a11bfca83e3b09d3ad693d7d66502181b48da3c86da2a2287180aac0c85c855ea3b07d98c80d64aeb3c141c9625c9f22d6ed14fd044d898995224013b560ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50f4e3755bd667d03d28cc942ca564b6

    SHA1

    fc3ce6b6f2ab5edaa371b24b96692ea094e57192

    SHA256

    c115a935967a7fe07f84783c640d5df5f4d7df05f2388b3d4625e7250593c7eb

    SHA512

    9d558932b96e23b8a2f1b32af9ef54b4a3a5833be884bc1dfb3f027817f0264f5154671399917edebcf286db57696d6ec13a08e62d62f638212f2fa6954d4edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a019f735072a398c9ab780cbd67e0e1d

    SHA1

    0d0514420d0771eb3d6ac45311ccd81252417bd0

    SHA256

    797627130460b0dde29fad88381fde452d39bf03e086ac2e722f6a3c8d03f29d

    SHA512

    13d2d25de72563525615097b0fefe6352d04680e172561ded080ac562674bcab295c4fc0481556eb4b2b97d244ee4b7b38e6b8c563d14ea9479f6b989e86cd5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67f82f8a909f8e5a91dfc1d306918ba5

    SHA1

    0a8cf9444ae02e1bcb94819be2965fdf18e9528e

    SHA256

    4f297bc919a24dc3caa52097ea71d7cd935719eeed282aa81ffba1d8b1cc7b67

    SHA512

    a38e9d73eee0896e1ffdc6ce047d2f76f48acfc8e261b9982ee0340bb80b2a4bac172c1332f47de8b9098de0752b4f930abdc0ba3658c06c877829c99b742133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4cdd7241e992339d8436c099a09af2a8

    SHA1

    7811b70200bfed95e0654155b605281a0328866e

    SHA256

    2636fcd7b9bbc6a4274d600a8bd59511398a6054401b1e73aa2a84ed15f6f901

    SHA512

    fbaaa060627784227e1897ad38d38083793ff604ba6c60640679ea5e64fadcb78e42aa28ae177ea7f87a99b6dd3f2c92f38a5a91d0720548c11a603af760225d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bde17d0f322fa903a1de8c0529aaa014

    SHA1

    dcfca584be9727c94f951bbfb1afc910c4224cf7

    SHA256

    a154f3c4ef12c573f770970636482d0d9d5e480102444afe4d4b4a0f230a43b2

    SHA512

    b1d5179755f07b29fee01ce003ef1018c597688686347817a8023205a2b08f86ac8d5f0d9a39b44b730511dd0e2173145e38f989c55b9b192209f3161b74ef54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55cbe951f17cb58d5c46d781c3274250

    SHA1

    c37ecaae9065f35580c2f91ed78b3cb69512dc83

    SHA256

    43f0279e2528a9c4facb3c3dc93583117424b8e14b110940d6ed15d6b9dddf3c

    SHA512

    68432cec5242bf1a754a67539f91f2f9527b7c85d7850f2ec13557d9a321bf0b8b1c514fd58fc54c669e6c83e6e2975166f0b87ced37ee19eef55e60efd528ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bd1b1f7ec59cfea0b09f6afd7d84be9

    SHA1

    2e1be1e886f5cc1bc3032caa1816ffa325f476f5

    SHA256

    2a37a46b672fed1f05cef4f5591f8c376dc359b7e5d57bc5999fda785885f77c

    SHA512

    42d7528ca1927465ab8595332d9fdc6eb7a46fd286cae987fc823461b9c7a69b5adae41c094d2ed28094cfca83e31d0f646f4642cfb31ab5c7d54f59bc2fa9c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b26ea939200e92a98a3c549ba0808a3

    SHA1

    7a1b387bbe45bed0d132ca8f0cfd37c944fc415d

    SHA256

    bc6fe2f215a09f0ac108215fbf73ce1ab55b624572705c245ffac38a30724e44

    SHA512

    c6932b9bfcca465b6602b347910befbbfd903b0360a02302463bfa24c844d128bfa74d4a607200b9631079da0f729190ab40fb7f777e723246add258656f6906

  • C:\Users\Admin\AppData\Local\Temp\Cab86D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8DD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b