Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    168s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 19:37

General

  • Target

    Volvo_group_SKM_B78653.pdf

  • Size

    63KB

  • MD5

    abedb2dd6ab47fac946c05108fa00d59

  • SHA1

    d1a1b1fce53b7d77bbcbe7a66b1083996fde65b2

  • SHA256

    965f31075d7827337e2e244905908be2134bc709cc59fbcba613f37adac7ac9f

  • SHA512

    7d72255617ab70652da0bfe6ef96912c45615dca094b4b3cfc2482cf11b6a7a9bb3ea9492e260140c332dffdf6a9143e6e3e17cbb65b1e6c742a80c6d543080a

  • SSDEEP

    768:2sQQQQQQQQQQQQQQcqPH9N4DYnzwQvvB82StbIc0eG5uzkTlb3acRlKrWU5/FLfa:2Y44sLt8AsDb3DuDdLfa

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Volvo_group_SKM_B78653.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" "file:///C|/Users/Admin/AppData/Local/Temp/ https://99f54536.a73b795372a7b3c990c4e43e.workers.dev/?qrc=bWFyY3VzLndpbGhlbG1zc29uQHZvbHZvLmNvbQ== "
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2860
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:209938 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    278fbaddfd605b498db9da1f6b7628e9

    SHA1

    767d6460c359f454090cd7b2efefa0509784331a

    SHA256

    923be1ff6b8f7d8655f9fbc7e9b2f0552531b1a7240ceab83004e0113040a790

    SHA512

    6515a46a206028a44bb638d4730dce29fbb0081f274830cda29d916a9bb6299d2e4ec2848e29843ca67438912cdd08a6ad13d2ed540a59dfbc1d47fa2659172b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a84adfc98f0d6410a52a9d197e2c7b87

    SHA1

    3492e17905847d0cb27ab77703c13d216990154e

    SHA256

    8c8e3a6b67337efa31769dc0afa0528ac42d86275ed4732cd883166911a6793a

    SHA512

    634aab90410ef873c8b3817e82f26d0aad1f68416338b0fdaa7768d47ba0932a43398daa765ace6ec6042c5480cf817b561c716c43c50a17eb12c75d59d81bde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60ff45a29299692d26158ccae381643b

    SHA1

    4751bdc6d8f41fc8370f643808f6155671d6b4c4

    SHA256

    3fa19dec0a2326f4a5a276f6c18213374a60e933a507caf80c1bf41f0f3de675

    SHA512

    ad3902ee40f9a11ae46d0aba4db5a2f6df107b593d9c395a6c77a2a72c0595aae1ceb1c7ec32b2817ebd7a5fb65df56ca608798803671b734ddc6989aa1a9538

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c70f1301589f647c59b9b19aad06fde9

    SHA1

    2be6cafce0b4ea0ddf37bde7a405e6c31c08cb58

    SHA256

    00dc78039f71e0907bb92df73d77d39ddc06409e5fa21b1f7add05c593d48770

    SHA512

    8763de69cf0e8952c2bad6b31b16771ab3e62750734ee365002cc13244292162d2a54a78e7b5a746465953faad7a81e0585f53aa42ceca199f854c743adbea80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7cbe97c5cc57e76de464e6d3b4b8295

    SHA1

    c43d480e31ea66f33a7d645a7b34efe2177d5b61

    SHA256

    e1cc08dfd83bdcbcbd6dfe7c75a59e94b150c6e80c9ce60afd175fd769bf9c39

    SHA512

    897ee9a7e186417ed32bc807f9905b599cb833678910d48f5e45432fc134fa209a33f0e803258c7019e1948a1abae9729a78a4933af184affbd98044d9ddce75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72559eea0ed35e4b99d407dfb725b7ce

    SHA1

    63d341b7483162bf78e4e963a481d31612b3f590

    SHA256

    4b1e02b0ac2e81cf3f065cfdab384f426a069441507951a79d86a61bba06acae

    SHA512

    2640f35aff1ae093591a69ad7b026ab7a54c0da348492058a500c3026602c0831b8e1dee5edc828c1884b1d439fe28ebe0e98aaeb641be87f19f49347eff21a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ba88ee29585d339025b6255ef0cc73e

    SHA1

    640b7855ef61ba813a0425556d3e87f75e945b0c

    SHA256

    26782ac040cc46e9ccd98b9d94d20bebeb85be01a43404ec2f27f2589b496142

    SHA512

    1734accac97e64b51155bfca947f9e06ea83cd361809efe34bdcf2e81d3fcda63eace77042e1829ab33ded33ce30be151cb3067cc0ecb4ac12c9b647bd40f11b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a804bd9a2f9b6e24715bee9b2547aa99

    SHA1

    c146ca506759dd7ddbd105ac0e4edbc0720ab59c

    SHA256

    cc0ab08dbca18fc94b83ecd117e3517c948855ce6170244a503f05462f679f37

    SHA512

    f9871c35aff836e82be75aa0d0fd3afb4d5340c7360c94ea99e29ce08398703aca4aaac48860acf21ddde333bb4455ffd45ddcfd18b84c3fd5d6568f60747804

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9aafdbf43f1a9524dbc7937ec7c71d3d

    SHA1

    b8ef988924bc1baca3fcd79faecdac8865f9f79d

    SHA256

    7713b74444a78ce06f8d37909eec4feaf06c6406487056a1d6e47e7e2e273e52

    SHA512

    76d620ad283cbbba3cac962e2b500bb3c26a174a89c4f4be57f38e1bdb99a8a8c793fd538b9197c846658f2668bfa147f9a91062ba4ad90ee1312691b3c08d54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41cee2c6ebfa3ccf8f0367d64c0631c6

    SHA1

    c7ad1c3033307f32dd7f0cdfdaa602bf959af75d

    SHA256

    d4923c11954289b2e31c70391fad56e9631079d0129f838f5732f7eaf5c6fde0

    SHA512

    47312a8ee5c3080403f2b515ee02eecd79d01b3606f6216187ec99e8e038203fabb6049b9df963b847114088618c60e9cdeaad5087b404950b94d0e5ac5ad032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f5fed6adfcefff484cdf540c6584e01

    SHA1

    f4e922fb9d83e5a418a62511d243366bd061e2f4

    SHA256

    94c74ece87f8345c8f1cc33986c2b2d1b7c4e9edd7902e8a74f3518e32f5b851

    SHA512

    daa8a0617a9111e4ad13e7ff0c1dbe60806d42096ccd6881b52446b727c587419c3341089a7530e24c594574cf857e9a3aa4bbdb36dd403971db59866c2e1c1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30c578c428cd93e08f16cd4f8990f90a

    SHA1

    bf8d181ea04fd0c45c0e5e16a7a5113f3ba7df0e

    SHA256

    2ef7e71206d84599e1e20ee9345da53f03e1788cf56c5534f9b98097444f500a

    SHA512

    df2e2159d09774c7a7f3eb6e28fd50aa018c62544a2a2a04de834a8d1207237d2598f1d8c2a3a0b0f0d160fa1d42a6bfa25d331368d634b536a73a4c78aea8c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e40627e71b104c6f4fbbdfc229b6dd5

    SHA1

    2e2fdff6b14fdb148f745e06ba533c38fba750ba

    SHA256

    24eb9fc5c87acba94fc0660e71dbe08282f47a9338fedf8cee7ba35106dded74

    SHA512

    7153dbc3a20e61486535149e61383c45cfb435843fda683e171882269040e4178356ef0e42149400b567549b4ec63b5e53b4f158e8ee18012ead2527ae93679d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fad0ba739d885920a8ffc3e2b0f0c69e

    SHA1

    c147b28b5471805730626cf3c3f36596cd45249f

    SHA256

    81c2c8030341420c51646d96e8c8cf5c22e98b90fb39ab53c4008c380ed75c85

    SHA512

    3e5d392374071e18811ad276e0807cf8217c4305f4388e8b8fc363a6a5f044d807a5f76c0d62ff3440f5db49ddfdc066bcf93281a0b262606d409f422b9d3722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3c3f4a0352452b76b05ef0103c5f618

    SHA1

    2a2232230d0e1a37620d60a579725b5827ef6504

    SHA256

    7ed631490c78802bc944ec3fba3eae0ab68204f09c18df10d18598dbc785c3c4

    SHA512

    3df3ce7453dbdf453e7f683ec060bc8b4fe6fddbbbe8b5088ebe20fb901c80b49fb99b6a17d9a8521ddb894cf8c12327fb9412f364d595e50ad1b8ba1834e866

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07fc41530401dce4e4b0b84e94910ab2

    SHA1

    904c7603cc2682bba9dba7f5e2125a4e1c6fbe4c

    SHA256

    85951a9615ae2c495d397acce80c31d671ca6f5346a4ed920932f5686ba25e8e

    SHA512

    2bedbf429f231726bea2a5e5d430f65ab870cfbf59bd31782da9c31872aa1d01d26f797eeed18a71cda7ef616853c61c85447462469e6678cebddcd54bcc4a28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c4c3c5c127dbadd4b992a8668bb447e

    SHA1

    b1378b6bd58a27aecaecc2c9c52a8b5e2313a597

    SHA256

    25944143a24c313dd720d5eb67d7a397317a070b4707077691f04ce600af4244

    SHA512

    1247abe3184a4a766400848301185e9b17a22c9c71703addfdbb97b4c731c9e7108b32e7dca92e68289e3b4ba7dfac4df103d16a1f83b159362d33b81d259bdd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    414865762e0cbe2bd65585e75ea01de3

    SHA1

    fc8ae3ad27ac184a7d37722765ce773ac8bd3edc

    SHA256

    cd11a5e6181ea4947cfd39418ae76912eafe7d8c707d41cc47ee4025d62d1e12

    SHA512

    ec7c1a690bae5b56531934dd15e2176159838f4f8e72a9dde43f00efbba029aa5058e9f44c44178c6669fd6e3a3497a9d6a1c15d9980c5e2efe239d75a37f354

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05764de713cd06a1908c58e46579b8b3

    SHA1

    073b281771d15ce7a410c6ba192f6388b558e472

    SHA256

    3b1eeccd53372135305ed18cd7ad3fd1a38e641fbc60a8d6610941d6db1fb4d8

    SHA512

    26ef3211a33e4397229ba8bf5bc01b9e39197983abbd2185e9a52e351a2e5c34a803b9d74c916ce11e511db9ada3ccd2b9f9590f1236f03d851f945e6d226af6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7901421cc82b72220c60a13db0390718

    SHA1

    d3147b621b1b87f93f2fff110a70edd3fc913c09

    SHA256

    e27d108659ea8e0053b839c7d4d0836291e78cb3f4c5589fdfff0b4339afb0f1

    SHA512

    3abbec0deb64c8b3864a135249677564b354af06d499feefaa8289131654a7cd1c8e21192e7660e3aa02d91f6c24e348bc03ff5506eaf9376249925aeda56905

  • C:\Users\Admin\AppData\Local\Temp\CabD443.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD4C3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e8643bbfd4a601a8cc756ca681288b23

    SHA1

    9c5f1654be3fdc80bfef60a6133f919ece73d5f2

    SHA256

    703ed9b091f12daa1d50a8f8ebc6333800d2f61378e6ac396f57c683cf3ad75f

    SHA512

    0ddc491f5231bb2714ea5b9b2de02b55df9145cb255a5ad98cdf2a998c9d4b8eca5a2a54105c93dff216c0a2c5f506af4a0fa7a6dc858f3d0e34814102e710d7