Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 21:59

240901-1v95hstdqc 3

01/09/2024, 21:58

240901-1vp5catdpd 3

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:58

General

  • Target

    Mod_1235181370_DesignatorShapes.xml

  • Size

    391B

  • MD5

    a4935c9f99554429c0a733248e29a084

  • SHA1

    42d0af284b195e05fc920c8faf1e0101e7b2b0bc

  • SHA256

    567077affb98371d4bdba4e0929422b866c109eef2bfae580ed82ad60f6d8fe9

  • SHA512

    39a938bef206d28e5ef600d114648850f8fd8d62b43b9013934b189ce5cb93b14302f08baf9e797a54bb48cad323cf4679b5402459f27d1335aedf27214e1a41

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mod_1235181370_DesignatorShapes.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7e651cea259c1c1ffc48513199bc94f

    SHA1

    382ffc9ef9342dcedc9212bb4b9a471855973217

    SHA256

    38df9bcb0425a4be56a7216f5bd7acb83329d36fa26d7e52cb2c576cf236ff75

    SHA512

    29f8f00ec13a379754e089172723c5347f0516f2dbd42714c97b3a6188e67a3fc18f25fd7b0421d830a66d41abb10ad8bd5846537ecdf0a168675bb8b482175e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d2fc9ab3a87da52a27de84efbde283d

    SHA1

    d4ec3e7beda6675018056e850e2aa513261e60b6

    SHA256

    b914db1d426a8ec82c75975d72a3e2bb3662a861302b8f45602a608faa5090d3

    SHA512

    921ae5bd56590ee56564166bb75c2f78b2ea0cea3ffb878df03d496ce110dc01baf77e0ea8e317f334cb9a7a10395f4c841640ef91f1d418fd9ed274f2e2e1d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f5020e89f4a25df8394a86d4b9e1bb5

    SHA1

    699d0fff0a5977d33aceb1f639f06f35b29cb847

    SHA256

    0cf045c5eff2b98f72f9fb010a4dc021cbc49935acc39b75b679670a5b7780c4

    SHA512

    30cc2f8fe65256ffc23d746decfee7603bfa9311c11943c7aa9c8f50362a8057f0c8dc2e969ec434cfc1c0a8e9fd0b89ba25913f321f83e2ea6a833bc4841be9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e4c89156e4767075fb7b49ff9506f15

    SHA1

    9394bfc5f6a7275b8bb370d40866ff8c539e28ac

    SHA256

    0a9fbd625d782e874cf59b0db5928eb8c458196f67af4783a93af0945df62923

    SHA512

    f20f008b5e1e3b67539e863aa822b2eba02c4da9a0a95f7014f370363732f0869aab5dbfe41697a11c69ee8a4c77641319b0a9c90d3d23a3e39e0c18af395c87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04a6cbe3a044589800affefd2dcad40a

    SHA1

    be1f693093b84c838d31c1ac32fcd191bf28902d

    SHA256

    d8811e1f57bfbd10d1882af0e472ef7af0733c1e5d5ea0a191ffaf18a788fde3

    SHA512

    c7bdfbfe202b321162d572efe06e77932ee3108abba6e049d9069747ac4df6a93edaa769f226741e491bd2aa3d121e46b86fb8a36d18d84afdfbb28415f2ea93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad750ae735ecfc4deffd145af8e1aefe

    SHA1

    c226c9866978ce6b8766b11cdbe51efb1612508b

    SHA256

    7ed72bab284f794e78ebaf20d3a5799753bc48207c16e9eb67bd5f45efc77852

    SHA512

    c2d80448db412f1baed864abc9271f7eab6fd8d416b0308e22ee832a479d5bf1fbdaea1b0924284738c08ae925437703f932a8b3243cca6127c46e8b06ee7a77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16f521ae524e845a9a1fee63c2449870

    SHA1

    f8872e9d4cfc9ff3026148f2300288c42a37fa03

    SHA256

    c27597c6320c76fe6df22093491b1d07a4baca54b069e2beb13833cf95ffbfa3

    SHA512

    c91aac2c568c0f21d8527acab53b2c7b12f8f4ffc74e7347d9858f8c9901ee631c413116e18b6e1edcabcd8aa178fd38d4eccf7fd79c143be65844551b357e4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b8214fd5a1adc0894d2b327b70a290e

    SHA1

    38e98f2a9d4c3334ccdbb083a12134769bcaa70a

    SHA256

    7fd665f73d33d5659b7b1c7becbf84deb660a08891dd69a787776cad15ae8c0c

    SHA512

    61b6476ec3d32f7e9b3a048d5859c5a5283c78f999c104b654ed2c631642ede7580f4222812d391ae052d5cdc958d1369174d74acc40ea6c7cf0cb1e982e20ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3df128835da177643490ffb0daa3dd7

    SHA1

    f4413a16a06d4b8dee84505e58ef646ca38c2ce2

    SHA256

    f7a55741e530135c7b5eaba661dab0ba9c80cb7d4aaceda422ea4b35ebe7dd11

    SHA512

    5324ffa181b601c55da259ffdb23f63ec617900b1ab80ae11018b026f22229565e026218571af5a28577956656d58d47fe9a16c11cb1d38fddb99e4bfbc5ffb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31de2855a31c46bd522e6f314e9582fd

    SHA1

    b553ade597acb57d0cd23a07c8bc2f49d95fda86

    SHA256

    0f661b722ef3f3b7821e7eb9d7c8970e88c7382e7e57ed566f133ab5a618c7b7

    SHA512

    6d1d4555b2b5bddfaa7694947a3d1ab6cdc5e82ad39d4e75ea920fb96c3d9817b909b24eac813f73b7c510ee19ed84a980ea3401e764e3c73558171c79e0560f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d277a1124ce95f2c63259b29c974ba35

    SHA1

    e6bcfba48c3c1fd34bbb85fd468f72047bb87b74

    SHA256

    635ff706ffb3a8c0ea6abc951a6b7d5e2aa341ae89b214a9152b6cd5186c38fd

    SHA512

    393ed16070345ae86afccb35899ededf175e4d73c051dcb92f4169dca78a10a7492c4254f446c016154e9bac75b5d97b686e7548df726454c7d9a8e6605922a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdc656860f2c048a3935ec14c7ecd9bf

    SHA1

    4b7f12c04fe86269070f079e1eb651db1e9d27eb

    SHA256

    7b1a553879dc93b7f185e8fe0dfd2874c8ec19b40df8c0854e65a5ca19b84812

    SHA512

    000b838e29d58e309fafed441a62715eccc791017245580a8bd8a93484da5307cd74500615e091c1ba42bc5193ae6f4596fd227642cbd42ba91cc30f161bc2d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a42514b407b33c7195d3b61c5d7a576

    SHA1

    37ed7270f0d3bfaeffb91506ceb5b122e7dc711d

    SHA256

    33110b5f61080ca57c004259dd2ba5d507399c76978b79477882e231e4fae135

    SHA512

    c0b7e5f45f54742add1415b00c58ea6822eb714c22562f75b50544fab40533f0afdbba7ba57d0f3e9ee12f7331216b25cf77b5ae1633efc1991724481b902b87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8341d2ae3770e1fe8d7ada1f3aef822e

    SHA1

    b8d39a8dce36320482fd30ea469ba127af95a3b1

    SHA256

    9cf067c3eac83662679d980ce22b7abff7f69fa5b401b3a884f1b418f1f00e73

    SHA512

    17c2294c12c5ea805d4b05e394904073558aa8cc6c887eb45ad380a38ffd5adee79d78f22b42a81f99f81e5ff9c9f80dcea42b9eaaca391b12809fa7cc7f705c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97ee3e158654a8c7d7babc8c4a92463d

    SHA1

    67d135dbf744dfea622d91aeb3edf8ace6b440a4

    SHA256

    a78365f221d5e59e8532e540d56a54f7bd96d042f30e7619de22ea079f615fe9

    SHA512

    09b74b865fddc4e154fc1b5ba1c68ca36993bf20f96d865c7b717bef951584f0723dc65a202e9a9583b0b321ee5a8f5853905040c48839ed8dc7439a5dad7249

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7734d19f60811b70497fa9041f804845

    SHA1

    cc2eca31247f8137d891080dfb55d0251ca8679d

    SHA256

    bbde8e98733a074d0c0fd06d3524d020e386770639b026acac5ff94dd53ade76

    SHA512

    f72c16c75978e17d4a4b3a59eb79c2c225478bb46aad2e717ce2acf4030f6849b6e409561fba1f284f6127bb9d993b5fdecdf7bce2f713e69711586d83a6cc44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    055c428c1c55a38eec89294022ca9b33

    SHA1

    d9914b934e4b22bc091b5d147bed6b2d545b9bac

    SHA256

    473c3909dea7961aba64e40be1d209c3bcc81929a050596b237eb391806e3f8c

    SHA512

    0d81156bf6463e0239cd4aac5e6d3cbe4678e05c0a56c2d04a36239babe50c4933e440cf1a1fab90d97bf7ee794aebe758f63a6f7baeb8a337f28221f3005c1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff6ddb56a0e0a9e2fc4315c143e873bf

    SHA1

    ef3e892a9257aeed08de68e5788f4eea5594f5d9

    SHA256

    a71daa2b71c6bc8e75e9256b2329cb75fab475d6001cec8da767549d7499bc8e

    SHA512

    38656c67ecbe0ed961814c3498a0e5ead5f7ed54d94fc05b6e57117bb1eba469d214880784e96a8c1015e85d096e43cb371d37bf8062814128608cdc15c3de54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ff6baa5e70043d002cfacbbb31603ba

    SHA1

    65e7ddf9f9d69c2323da8b981dc1b9dc10b63f28

    SHA256

    8c41f7910178cb132070f58d6b3886ce3acbf87fad19647a3d79469e003c6eef

    SHA512

    213aee12bcb0cfadd394304fdbf67d4a4a1275039ca90e61687e3ef00f3bf82e0f4fead7f3a2c61b00bdd19d39dd60abc4a7f10def9eabbef5f025b71d1b5f44

  • C:\Users\Admin\AppData\Local\Temp\Cab791.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar812.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b