Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 15:50

General

  • Target

    FModel.exe

  • Size

    30.3MB

  • MD5

    b4ebf2a58ad70f931c581e639cfe88c4

  • SHA1

    3f2ac147cdd474c22cf54e40dcfb7863e8494369

  • SHA256

    616580b4f0292b2a93b957cca624683a7b8d750807ab6c0ef9dda6e6920ca1cf

  • SHA512

    eb09e5035bb776b97bd96a4582d24b72dc199b54f14c724b161c4bdc1b21f273432a53eda4ff7d45ae03e3bcd3920e1fe1d028959de919b0df3d3fb396c4db18

  • SSDEEP

    196608:AxxDjECsn99bg7s3dwzJD3Z40DbTlqWchPL/TUyuVyAh+TZOENCzVknONqV5m4n0:Axx3ECOF3dwtCER/sZOzGnOY55n0

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FModel.exe
    "C:\Users\Admin\AppData\Local\Temp\FModel.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.5&gui=true
      2⤵
      • System Time Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e338909908ad4efbb046f8080d28614

    SHA1

    a8a19e046c23cea0e80c0181b658a2f727086617

    SHA256

    ef713ea814d63e066c377626649c5c429b3acf7e6c25e521462fcc95eaf15056

    SHA512

    e8b5dbdd092f242f52df6c900b1d192bfd37e13d8beecee2833b1430b491449d7a98a105bca5c0e1be5423bee0d0b64a323af87ef9512471c136c055f565f6c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    163839fdfce40f256fc3b032de02e494

    SHA1

    a7b321c8de6c2e064d865bef2ec68c7f468daf4c

    SHA256

    c8fd1cc37fc77fc30fd8ebdc7096c036d8356cd04c01406765d57e82091909d1

    SHA512

    d0376cd7176261e534f8ac17618fe1c8dc70025ff5770ab0a2dfc0e8bc0ac8d069232be0b59d7f52a5001e7e7fab3641c41987832b220dcab0a124ab0ba4e533

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a5f0f7f75b8e5e6be6510efe41167bb

    SHA1

    4aab49fd77bfd9eabee1be26f502c60ab8f63974

    SHA256

    edf7bd88b624187a0d6f4c08f0e865956bbad0da33286da0c1796cd0cada30f3

    SHA512

    e8404353bbc8940f9b00a0fd4b3278604bf252bebe8640cd4a3fb9df0a90a0d940b128539ff694bc56593b19835d8106c6a859a883651a2c9b152ef73716f182

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee3257fa6411d8d8a8188323834b20af

    SHA1

    189859db7c8707a0a55b7f1e5a7bdcd6c4a11599

    SHA256

    81421a8107380b3f09cc7e575d76494232f102042a4e14090a630b9fedbfb9fe

    SHA512

    6da9d9a7f9951ecded332bc9e6bc9e0af8c3b55a1a6e2525ebdddbcf25e4a0327d29bcefdbda3ce5a0c1fbb150c1b99d6def62bbd427b8918b33d7f0a7918b49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77b091742c2dcc5c1b233743c14713fd

    SHA1

    2c385533dd5ce8ac98bd57f3f2ec987e697d0a08

    SHA256

    022ed2bd1648bb7390d8f28866cce8e4defc7dd80f54c4428f7f1d6bb635ddd4

    SHA512

    a1977db8399088f406a864c98769605ddc334fb20af087e69e361a686f11db1a825d9e1d9e55f96b2d9ca42bd013f5b7172bce558f28092ebfd0da2f7fd7d4b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c42affe4bb4038be19902f9aed9dbea

    SHA1

    cdd758b43d0a083b0c592c567f9b2adc40206d00

    SHA256

    67b140366ffea41fdc4d41f4823aa3512c8f862013f23d07b2f0b1d222ee1d28

    SHA512

    c9b640bf28334ce76f281d4c7919669c1447b69a7757618794ead2c89ca0b3726d6d8250764fef540ba7e0f64904143cf2a6322245606e19884cd427a9d51d57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cb076fe59e6eb7e5707be3c9d36d7c3

    SHA1

    47cd485055593b0fd9625ca37e2af22007b165d8

    SHA256

    f9ce0dd3ef6099b6fd80ab714168bb154f615e8e8471d78483955b29d463f205

    SHA512

    cfa508624cc3ceb4ffb636ecbf7ad420662bca0f8627acfe6621189c49dbf44acd4974681a1ae8571a0fbc2623af016d6b4703b1892cc444636946a9209f9a3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1734d226942bfa0bb3c3d36590d9eb7

    SHA1

    4b00576f67a8b4ac44b3ae420953d8bb4c751aed

    SHA256

    f7d51d0a756e5b10cf5a4d911d3030546b44383f40f4ddc093c5cd8c5f95d875

    SHA512

    43bf601c1d857f25841daa623f1006927821f318f94c85e32ee13ebdcd153626cb4ba36d9aaa7145cffc701de3c152e9f4bb2396e97b0cc139acf3abe1e2fa86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b332630652af36427db6ebeb1e1be05

    SHA1

    f0dc48ade338dc5f80cf179a286e3482dbd2449d

    SHA256

    93d2441758980270198be8bbd3b3e5dd1bd7853c608ca69bcb10c5a64eeaffa4

    SHA512

    71df0e77cd0bd08d93a3938be17ac0792dff0c53a3a15d4307681d77dfb7160e11f23d02d27bfab21e100e3ff6db265c3c8d29f522eafc1adfcf18578c596836

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c9c27b9a35d54beaecd409b711f0400

    SHA1

    24ae3b00fa5bd594bfa6698c4f1b607ae5bd4697

    SHA256

    640cd171942506856f1a1688fc37f3e21d8e20ba5a6958ade2734aedd439ea58

    SHA512

    65257cdc825c082a35f36c4326e9a386aca9fb35e2c4d85f703d5793db21b12819898089665eafd016c410ab27d8f0faf6c6fb60d514bcc07c16b6dcdc4624f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57dec32a49d19fdb5c3775d3e3d7b98e

    SHA1

    0d2f13efc0197c14da8cead8d4380248f1967b92

    SHA256

    952c12baa04b8eab5e6a7e21ddbf62e3e278d41e70f9c8e7d0830494af781c6a

    SHA512

    c2f0d2ecce923244356dbf44bc5e998d9b9e8cdf87ec01660f0c12e0984dfd12ece77ed84482e01bea20bfb181a6ffe89de0f97d140611e17b65848c159fad95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1fbf86f941873bb0329f80852a5c7a7

    SHA1

    aa0ceda6a07a3e36be5f3018b718c4133bb38859

    SHA256

    12d6741ab139839c5145c59e87cfcafe878493504b2679d0b87e81b0f9ecc211

    SHA512

    f7dd6576471a920223acbfdd2a5abb5b4bf7b7e5ea223014da44e349af80bcee8d791fd120ebb75caaa572fad0ded1939fa103fcfef7fec57103cc7c91ceaf28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00b9dad428b2c49204045d750c07686c

    SHA1

    94f3d2c8749a7dfc4a8c071338d60e56195c2964

    SHA256

    9d7ec288584f3862c75291cf66e03d19070cd3a4149347e70bc8d2495e1b764f

    SHA512

    70cada73410e96c1670bc7b2b5a365cc8a31e669e848cde0f9b03266a06a5c055776cb29f7216c554503f0489bc68ecb2b13b2d809ed111b23d41d60e9a3c6fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c587dafdb1d9e2691eaf5ca524c481f3

    SHA1

    a94856bf3d67f74bb1b0c794dfa2ab1ff525d671

    SHA256

    fd5466b2ed6f677ef3996020a0eb5310e3e21ddee8ba88fb3f3cd74ecbe3a040

    SHA512

    c78371dd6767928c15295dce59c0b19a2599230e3f6144289ad17032ab5aaaffc09db1dca280e6db0f2777e3b785da1f38b725e0481041aeb785e0d478700c6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc7a955f42502b2309f8185e0743f820

    SHA1

    0d2ac9a58fabaf45094744d2b403bae6cb6046de

    SHA256

    0bbb8905d1f91ab49ad94edd9e15179d9bf09223297a4dd282f652dc94e3d4f0

    SHA512

    45bfb1dc5d0271d766f286cf21714559eb0bc21f657fcf9a07322fff3fd59d9c732e03f3e1cdb18763f0d9dc2292bd8a5abbc131218c789aadeb5a80a2518ebb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a452720cc10e47d00cdf6ee591a42dc

    SHA1

    47f8c210371674c542643d8a8996a69ed9c5582e

    SHA256

    39b354872b65b85ea221aa44ec306be889b2c561eae020f760e675555178cdca

    SHA512

    9a82a7307954fdacd6a61a3ee7230bcb003daed759fc020103dd2327191d4e8a9b5bfdf74d72035351d5d42e26dfaae9eaeac7df6c3b0d0dcca114f0e8a53082

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c257e7eb2c975575dacab54b3f9d8970

    SHA1

    5f4edd17c5cb9adcc19b3239e97d40dad09f43ef

    SHA256

    2c05a25b6b4e06c8c0e4e5502be5bc7959953529c83a7bf94d0181fe8e9d694c

    SHA512

    78f5e73b83f8ccd8ac89b6794bfeea6783fd46e69c4cae243ad30a70fd19084b4a91dd2c6bb6008ba9197e666808fa0f40f7e31e2e921e2433d8174231d9b709

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98c97014140705ebf7c604546181804a

    SHA1

    7842ab127281181730eeb60a9f50d4e3a467d568

    SHA256

    470cb5d24666b30e68e1cc6e1452a02228045058bfe8be78c0eb1757c9d71ef6

    SHA512

    70aebf5c2eaffec5e206832ff8b3e96208b1dd0629e58b1a7efde2b3bbbf7a6fa55c724aa45696a1fdd2666189637fbb829a892255547d8f7d8319c679453e0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82420dce5c6fde6f973cb4e5b26dcfb1

    SHA1

    283b103f34a2ce4f3bb14a822c7203f70cca1c64

    SHA256

    35593b253a2389767c824ab2cb8c3037c6379ff4e5fe9c61e00fd4c888218892

    SHA512

    24c68e4d9eccb9bf80b60a0970d450869f5b6c5c94d5a5fee3fa8ee5b5e4879ff575a086b7ccafdd59bcf7cea4069c958aa9d5cf3cbaf9b90b7c3d42e3fc3003

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f6f163718da2915dd21e1220e926693

    SHA1

    2d5cac5182ac460adcd7f4a8d58cf9e99ae4f671

    SHA256

    61de0adf6a9a79d642539a557552dbce33b5f2feeb69c354b82dcc6f7d52af95

    SHA512

    c3ee3f4a4e32b2732224214528792d5486021f0d5a009ad4a143284a710764c9e254e84464cd173a5bfb5f87cab2726811392c244e2c06d08eec2b818a1e2d06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a9331c59cf9fc632f37f202eb77952a

    SHA1

    749436132fca4208b41576581ec3d46432d25055

    SHA256

    70ce468dbb7097d2241d5c2034391626180bdcf7fc4ce2e5893e8d3032969997

    SHA512

    115f1e081ee95f45459a5017040f19eb9a9e07d48777c8a13ebb8510fce0e70752efe075919a14aa5e45f1ac94ca34de2bcaf15cfcd1735a91d26e180216175c

  • C:\Users\Admin\AppData\Local\Temp\CabFD06.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar18C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2448-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB