Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 11:06 UTC

General

  • Target

    My.Summer.Car.v2023.12.10/My.Summer.Car.v2023.12.10/mysummercar_Data/Mono/etc/mono/2.0/web.xml

  • Size

    11KB

  • MD5

    2b6303c4f12762b71051db6e947f90a4

  • SHA1

    a4d7e05516f63d6ab67327b299d4fb2852cb840b

  • SHA256

    3c1a76a5849074b437d297656a208a3bef6d84b982153542b9c797046c601dfc

  • SHA512

    80f5da60654e1851ef21526e434b32d94e18883a08bacbbaa0e1f85b80469c46510b6ddb9b429f16cc4be89c6f2bb2627bbae9cb1d0c7e45b665efb7721c6d86

  • SSDEEP

    192:wcedeaZ0sEMYaWN5bs6yyzEVkEYEG/Z1f5v6CuCCrtQzPwkP/waeKjy:wj5YaWPs6/1zwya

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\My.Summer.Car.v2023.12.10\My.Summer.Car.v2023.12.10\mysummercar_Data\Mono\etc\mono\2.0\web.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2584

Network

    No results found
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    747 B
    7.8kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    747 B
    7.8kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    779 B
    7.8kB
    9
    12
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42c83a2c54ba861add65851efb1ebd2c

    SHA1

    f2ec64dcd1af1d1e290c2b16c1117dc7c63d6bdf

    SHA256

    deb9501dc25e3eef6a550be5e335fbf8c8d6f478d8372030c163725bff6b0094

    SHA512

    76f851b79d405e25886634f2dccd673f8bbc61df695f402c1a42e52f5a0994f1c01b89ee4837b2a65bd883e41c9623ad28e692d5d8e2e48358123deb9a2c5327

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8748af5bbdfd245482f64be8d8dbe3b

    SHA1

    c1bd7222d551a2413e4f6dc32091c385ab7b3bc3

    SHA256

    1a5e6904aa971122550e1e3350afc04450d47d0ca553f8c808d5289b5ebcf144

    SHA512

    af731b6f68e06a3807895a3deabd3aaebf13a31f9a059e2d1a1415d73bbc5aaa7474ef7ba1215e4dddd8b9782d119e035a2fc302e02e56f5a47c02779c4cecf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    900a7628e0c69e0f4b7b81734ed72b14

    SHA1

    3488a7dcc0bf9c34d5bb6ab10e3e922d5a3cc841

    SHA256

    15a1c07b0fb9ef4d7f8d978d2933af1a2469a33997e5748089ecaa61bece61c7

    SHA512

    0ab33126ea3df338d7710cea94c867798415aae208bead4a7bed59768a040b580b0dd99884d07affefc2b1c03be3428088ba3eb06375d0bde32a8317d0f32544

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d20efc685f7dd5bf7872de83fcc65e1f

    SHA1

    c55d3876b909c1174b41db8f6f97231225783562

    SHA256

    3804d2c20befdb4ce76b046e1b70d2e3bb00d821d48d4eab6a0bafe7f2c77ed4

    SHA512

    5a4940dab15633d804ca6da2af25e06684b7067e17fdaaf598258a6cbfd68434b55966dfacdc01bcd25e3ecb735d5fcab365dd85d9d9067dd72796a8cefe5eb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0b86d1e7d9bf752a7987c6d67e7fd6f

    SHA1

    dad7e29e8b146d65596e36349339ace1225ffb1b

    SHA256

    d7c432a17d7a75775be8cfe85b94018b22fa76a1737a666c27ed28016a10f0f7

    SHA512

    d03b5e0d332b74181edbaa70ac511c1e8996f69cf4010c5076e6b19973749434973e6583704abaf6b38f4dbb8eb5ad97c6b0c02f56cb858befa54471e3007653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68bfe7eb92aabc4062eda87b2110814d

    SHA1

    a1668c95c851281cfdd0b9ef5048cbfa9809acaa

    SHA256

    822ef203ec9379a05c04ec5830591e8186ea70f19ce3ad93b0921b9f4f257337

    SHA512

    8e12dbe9456ebafab789c8b85b6eaeb84d1e39fb39105fa734dbce9fdf268feea15c61fdf098a011058a9380682e764db86c3c2be0a85a24cc840f8eb3754cbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42af21e48fa3b2f84cefc3c76ce1fe6d

    SHA1

    c7d3d02b4fbe2ddab92bb6b7def347e6cfdad320

    SHA256

    bd6d4e28d2635fe82d8d4ce97408252a6271a603d415a76bdd43c82f659bc098

    SHA512

    907816943fe844afe738c19590a59c7e0b0f74b0ff7fbc388cecec2003caed536b4096815bd349f5a809dc46db694942cf1f00b4c0e28b88c735f7a5cb1ef25c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8065ac619314dcf117b0c9b1ef3b129a

    SHA1

    4ac2bdc43220499f097cb216db735d481ccf8859

    SHA256

    05e301ec987de836b64dd5a92f6d4aeb757ca5440c7e59c8455583b5aa9cc977

    SHA512

    e0d13305dcb963abd87c6cb677bef927b9c57b0e15b1a2bc9f9c1e1e8fa82141c2427c3b21c960230fb81e86e89058e8a05bae1f90495ace9a59907bce1b5250

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9634cbeab1e2067901402231e994726

    SHA1

    ad212afa2a1fa18e3d4bbac9e2a3bef298c52a6a

    SHA256

    25b8d98a8291006eb5d4d80abfa2cf33511ff3ff91e0b59073ffbbac840fe9e0

    SHA512

    a815cbcc0858be52e199349cc79301e2e56b987ed9719f778843fbccd971456fd447a1660960cb23a254507bf4fa93a40c34e12a13da0f20066f195508b4b44a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cae5ee381c9bc32a03bd32b7fd3d3f5

    SHA1

    2f49b286e76af9a807557b8c73c7cd45781ab229

    SHA256

    9738a4dc9b8c9745cab7a81350ae4b57544a17e5993a739bf4ab7ae8814fc2cc

    SHA512

    6f73d930d838d74acaa9730aac23b498af773719c6459e3ad56a5e7da522763f4b0a08d4a56f54de5f36e34ca20ea6ff46a8ffac62e0cff7403eb9b97fa942ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b639ac9ce6c4f12dd5bb7dd07f769e7c

    SHA1

    fd1944ce637de55ca4f2b6d433e43cc803b1aa01

    SHA256

    a99b0564170cf2de4706bdfad994802cf54134b435a14e2a3b7198d999e64a93

    SHA512

    265fe88f7a8225aead8ee9b357cbf6906ae9e5727a56a9cfb50d9191e0f7f682c96e7e4042512270773e6a28ce1477968dcc18853c7170f1852e66ddd2cd875e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03933fa1a8684d9b0551873d1738c18b

    SHA1

    444a18c834406cd11c719ed96f07c31acbb532ee

    SHA256

    e306435da0e682a7142bb637caf50fc3157df80e67c4fd4dd24073b625ced81f

    SHA512

    0f4eced4f8898070106286f7476616455cc3910f00f1a625c09e1b30cab4032e5ae4cfd5d05e719e1e3003994781a71c68a78b6e09cdf2d73702fd821206f64c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8124e30b26828723dbfa089902906347

    SHA1

    f4d135bf91de1888e087a404575c29b9f3e84848

    SHA256

    d4c51e713bdb362bac0f85a0e6253abfafd4d04cc8ead3d23637840ff08001c3

    SHA512

    22a1d027e5ffb501906400ba2b76a46ca3a2e87d9be4200c3f700964929d97ad3ae6273b88c9bb32f832651765031e29cfe48f3873c5719c75ecb85ebd2415ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ed26a604c5a5310652b0485408b70c2

    SHA1

    c027df6f589f12955e1e900dfc8e59b45ec66562

    SHA256

    cc8c14d7dd3f4879342d5bce31db5423e7c267a75ee3b666b4b02fde8a1880ea

    SHA512

    695c50be552e1edb6f77465a5c07b3c353c91f9e19d785e0e27f33df6ac197f3409be8634daa142a0cab981de98dfdcff3eadf82700e7b3e7a52d90bfeccf0b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad75bc53569a49dd18efca8f9687d66e

    SHA1

    9de2090c9943869375bf38f25d1ffb2cab697f42

    SHA256

    b88d2c1c6390cd63d16d04253003fc22419ba049ea7ab093db776c3de8911daf

    SHA512

    43342bd7d6c83b1ad220cfa2303784779c17c0e60c97ab765a14456b1adc252e7dea82578e320197ee8d6d507dcd8865524ddaff24afc7003fde6d6e75954c2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59a98571723e9d9d5bf960c7be5177f7

    SHA1

    48a866c9a818b58393b76427715d2c3b69af80e8

    SHA256

    753f3d3acc7bf16c251727d17f49e61bd9e7e285c9a37bba0624587d454692da

    SHA512

    ae714283d5189b22c93d8448f87d744b234e07ee4c9e7b85086af9ed56511103ad39dd79d7733ed1456fc741157a877f4199ba3e850ee4434305e7b6ed2c0e55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    232d9345ce88122ebe3c72462addb21d

    SHA1

    2bfbb677b6faab25cbf400c2ced790e4314a8c09

    SHA256

    f87bc0d2beff161867b583f7029eea8f2a1e9c7f8dfc6473e8cead7dd46b6de5

    SHA512

    aafb42f745960e3feab230f92938c9c026711c8532872a20b8f5373b9350392c8ad8431089326e33bb93e375ecf0e0165907648ad971c9c0309c1e5a48c40308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c6c1e6aa8418d5dea9131e173bcb91e

    SHA1

    1109a06fa420b65a5b81fa3602cc92c86b330837

    SHA256

    287fe87ef208699bbf07cbc240e18b142ef17f15d61d1ed35e9318d75951c034

    SHA512

    501872db64f10aec3e90563280e25eddc7c340fab1cd4c0a54fb90a379f665ce1808e4776adf5024aac450d8c7e65b72eeb278c9ffa31b5e000097210c2f6dc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cd4af0dec0f88e37a9925f7d67cb2de

    SHA1

    855d1af78211741caabd47e98cc1320611da6a3f

    SHA256

    d2e563947ddd2c94de4ac7c70c42772b8f9ac42a9db810ec0f966ea7056903bb

    SHA512

    7a96a3a81683d73a2a060f5d6b1fb3c6a39dccc0523fd27574954d88f0ed13f6616364b8dd5076c3e2dee6d18e6e8f4e80c0f1074b6d58637e36501a030284a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d280d53435f789a2cb4ac67327009262

    SHA1

    a26bcd3c9effa3fda5e60971f82529b32c4d87be

    SHA256

    017dfc0f99c3ab7c0838d8449be76ab878427077d9e034a6272ad8acddf9566c

    SHA512

    d60d0d9cf365ebf758b37427cdd527b66c76f6848dfae01cfa6b7b34da3e9df57aaf71ae8985870f76a5783173f7a0bae2e8034eb8d97d3f35a280da994d3bb6

  • C:\Users\Admin\AppData\Local\Temp\Cab5870.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar58E0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.