Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    615s
  • max time network
    616s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 09:47

General

  • Target

    http://fools;.cck

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://fools;.cck
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2380
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
      PID:2984
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
      • System Location Discovery: System Language Discovery
      PID:1624
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x1c0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2340

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c764147aedc299901945661d06ef263e

      SHA1

      3d902e617de3d5514b2de36b7736819664896b83

      SHA256

      570a4f0a5f073e9057e282ca479c1d868efe05fcfb67800015ad8e7d2b2a0181

      SHA512

      6c39dd1e3f8c904af52e1c2037b0b9009bc1b24fc0ed6244d150acf8ba26f12bbca86caab9c11516c4afb257ba06fe712cad3b8e973ad3f7c0bebd58f8ec0ada

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3255952f5d35c2f3d42287cfda86824b

      SHA1

      4329fef7c0d88bc34f1e996d195ec6e040792a57

      SHA256

      f60b2d8db396afe56384908451bef1322b79d8b73519c5e900b68543a6d07e35

      SHA512

      b05cca1b4996068fcef30dac40addd9afa4b5602c75db4aec07555dff7e1b120861b6238f76663fc85c8ef1c0301358fc4c9951692f42910e7269d8765931b64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7da7fae1ec2f468bd56cbd44428594ca

      SHA1

      22e8eecb9f3d2b90de14f2ba01408ced358cd3e8

      SHA256

      9da2b40e49cf8fac8043316a92da6cbd2aa9491a22460b382e91c2e58dfea0ee

      SHA512

      cc8cbcabff67923194f465c3d0197d2807dff07557e146dce2d8b0caa3329925d06e2fb07e471eb83bc608db4cdfc93a5949f3e04022e3abb42b5cc14ed8a881

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f58b954b81a739d213bdc65d9f026758

      SHA1

      1bde6f762a4a1c3eafd07627ff173268690fe086

      SHA256

      392f7a41cf2b217363b82b40af6d2a8603d4b7e24d3ab3e60ca2c093f00958ac

      SHA512

      3d24f17eacd13203e51c18ef41420200491d297603013eedbc2e5cb54b59925f26daff14780ccc1d64a37093d84b03cd03abd70b7ab9031ca595f80febd5adf6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f82eea5b762f0ac778afceff11e496aa

      SHA1

      aa0183fa211d31370ca8990fdbc2254c5125d770

      SHA256

      ab0f7b39ad79af55ef058899d3d4d4bad70e8c844345c16e0fdb4bdaddb27a32

      SHA512

      8e5057608d6810ea1e0220415e5f699db717c86f3199f534566f8fd031a245390fb7653f1ed1017ced1dfa2506ca9733ddd5a95a5ab601af7a99ebcf43d4aff8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      decd240e46e818cf5752b24e76fd759a

      SHA1

      1d022b28bc1023ccdd0349918870e50debc88b64

      SHA256

      4aef5b3584d98f1846ffdbc07b807a5031115a1187a626b2be0b619c70a2c15f

      SHA512

      33a67f93b92caf5840ea056b4b810170086b1d93e94bac9227658ac31bb5f390a32f3aa6853db927138b5ce4960115a1c41e96933813b58b1a182338390406cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ac3182c794756da6a0f1d582a70d5c55

      SHA1

      d22ac034c797099bd3689c79bf08224826de236a

      SHA256

      9a346372b4cd8dddf950ccb3b684c990678e2ffcd9d7a402ca7fdfdd7ad3bd99

      SHA512

      0f45fd145e70eac2dfacb4037505592b7649abb5bc24cca8607283c486a7ed64933d487f9a0e271dc34aab9f8a3767518a3cd2aebadc9c795908792a70f4ce6b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      19ef7eca78092dd3ca9d866401acd03e

      SHA1

      feca8f6ad690bd471eb5a8aa16de2ccc3071986a

      SHA256

      008c7dc7b7f7c9de78fc76f735537e6835b5d32a1256046a49ac203a66036d7d

      SHA512

      c6155ee0458b3079e471dfec7027a60cfa7ec2a930d5f039c05d368a4af4f8c17b8316d36337dba4b01d676f8a8fea77ff41f3adc7f7713e8cd2b1bfe13c252b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3b114d3a77f77308c7e72b5fd9aa727e

      SHA1

      fde2a635eb42e32d9caeb5d1d53c8bb6c22e61d6

      SHA256

      5f458d3ae2405c3731143d070087525c86c8f4ebccfec21449467856d0466549

      SHA512

      3c584ea598cf1bb2598ac58076e1d04d7219c4c68f79f15f0c24b2f5c035bd9a4439c495654d6a5bb6a5bf2560d66170aeb1840eb18e54fb7e0c0bff42c21b38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b7c4311d7532c2de730865e1c9d7965d

      SHA1

      87443ee4c16a499ab4120a9f41036622148bb77f

      SHA256

      df078cfd4a9baac77943f0457c26c3c39efc76688fe97d8476c7678305d7ebd6

      SHA512

      fbb8e5eb7763e90cdfafb7d204635bf02bc3aba7758a3c8abfa571f1bc8ba07d9c45eda7509ed6507127560043dfff951358f2a3a143ddfae13f7101af74ff07

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6a85beb7b0923ffd88690a09f95af65e

      SHA1

      270350a547e38b6b178d29b5180676afd83eeb52

      SHA256

      c194954bf3b72ecc303f463223fb7a66921888761ad90892c2a1dacb97786c43

      SHA512

      38bdb4853b2d5fe52f6d54128b7bb1014501e3e7a0815c86cac54176b1ee2df93f01344dd0b45d0bd683aba1b85b96787793f50c80a246c7572adc5635bd4b4c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a22d4bb3dc8c494c51fabfd2fc07761a

      SHA1

      d0d7050432a2061cf7c2424127523c705d264104

      SHA256

      13803547b399d0f50d9c782b40798d5e69912f9dfc3b1695473a3279152a9655

      SHA512

      fb24351e9c0b2e08e4b4b32096742889f11a094aa6c8eb9f12d573fa1a97b0ef10e1e47886e207fe29a68cd2a981354d764961d744bfcc456d3d2094d2c3f9c5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      22a966234601b2ac679d8c600f09d2c0

      SHA1

      59073957f1cc295051fe81b958e16245bb3e52ac

      SHA256

      193a28425087b3c989d1db1629b68ac4a653626f603e5310b7411c5d3d624453

      SHA512

      f360b557a7388b8ea9acf49b3d4ed82be7751d4e9e908e16a3fd7745f0c6d3ca3a146ef8d47f110ede621cc895d45df231dad2ffd84d0966ff105a2bf409d75b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8bba29ed9fdccc027791f882bec9db29

      SHA1

      8db8fe258b0b55147f91221ee07d614adc227062

      SHA256

      15d8fd86c2566a1543610258bba112e3db5d30fee4161e58b473ccfa59661838

      SHA512

      79de359331760ca92c924a1a906579c3377b6686c0b5f5aa22572d473afd343eaee2d07dfd49ae6e62540e375367c55b01b1c59fa973b790f33468628a1434fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      18e698e153ed5392faedb1b13a2fc6a7

      SHA1

      c9ad5b374f7b541fd0401b5a0687d69ce1396a2e

      SHA256

      f6190471113fd9dcc8234d10f944d2b97061a5107fadddeda1d5d56821c9695f

      SHA512

      ffe81581d6faeecad6210f1d1e9f34cdada1661141dfec068ea927ee9f78e725b0c8665f89cc40818a58ab65c4f4fcad70f0805c8ff907a6b79aece622ff5472

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5e146790010cb56765c91ec6b8f38bcc

      SHA1

      a655844392aabe00cffca4b01eb55b651147f86c

      SHA256

      96043e54fc75ea364476bad88d82b5b6126c987bd74559fad25325d31526fe86

      SHA512

      c0bc0fc13a16cbc908a91a5fbcb7c6074ace39cf3528f275d22f364943a180542695b2b062541fae80bdae57f0fe77d309ca4e49d6bec4a4f30e30990fd0df63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b0d21c9e8d9c183698ca2e8f83dc54a7

      SHA1

      4993f394606fc42bc1a4b987a69ea8dbdb378b98

      SHA256

      64c806e9e732b57f97c754f7a9f6b03ff38712110df8085a9e11f1b23fdc66b0

      SHA512

      941a7564f1dd9476e8f66581fcf7e66bad3dfcdbb7fd7cf89ac26eb69d1bdb3e426d7af93f3f0a829e17a3444fb75dcf42dae9f61321f36737779a1a0fd88896

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c9a7621ad24f0e6520edf40d3cdaade4

      SHA1

      534b640c5e2130ad12aa6634db531f106ad0f745

      SHA256

      d5e0b7c4c0a76f7deda5699bfc626a73bb7be9395fba65aeff61ed7c90431e21

      SHA512

      e847a7ebf300dcc6d43538b509b8612b458f10a4413c743b1240f119521c2ebe84a58ee14d3f06fbf1beabd395960d693d4ac28bce78ad703c989b9883d7195e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      005e6a27f719c34c3398909ef454ad04

      SHA1

      d923a565bc240f0f1f366ab12654983648142f46

      SHA256

      1737cc3daf51f032a78103cd545189e764fde76556ea20f994a0eb692b5724b7

      SHA512

      23e30e4b63a0230f216270ae9340329cc5f607455b3df2f89c0a31891655f0cfb3b68fde8f81d7e1c184458a4c6c6163cd75e142a0001a065267ca6aaaaa677f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\errorPageStrings[1]

      Filesize

      2KB

      MD5

      e3e4a98353f119b80b323302f26b78fa

      SHA1

      20ee35a370cdd3a8a7d04b506410300fd0a6a864

      SHA256

      9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

      SHA512

      d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\NewErrorPageTemplate[1]

      Filesize

      1KB

      MD5

      cdf81e591d9cbfb47a7f97a2bcdb70b9

      SHA1

      8f12010dfaacdecad77b70a3e781c707cf328496

      SHA256

      204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd

      SHA512

      977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\httpErrorPagesScripts[1]

      Filesize

      8KB

      MD5

      3f57b781cb3ef114dd0b665151571b7b

      SHA1

      ce6a63f996df3a1cccb81720e21204b825e0238c

      SHA256

      46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

      SHA512

      8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\dnserror[1]

      Filesize

      1KB

      MD5

      73c70b34b5f8f158d38a94b9d7766515

      SHA1

      e9eaa065bd6585a1b176e13615fd7e6ef96230a9

      SHA256

      3ebd34328a4386b4eba1f3d5f1252e7bd13744a6918720735020b4689c13fcf4

      SHA512

      927dcd4a8cfdeb0f970cb4ee3f059168b37e1e4e04733ed3356f77ca0448d2145e1abdd4f7ce1c6ca23c1e3676056894625b17987cc56c84c78e73f60e08fc0d

    • C:\Users\Admin\AppData\Local\Temp\CabEE.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar15E.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\~DF613E97A8EC6E1E54.TMP

      Filesize

      16KB

      MD5

      23a07601f6fdb9dc0835a0b8878b488e

      SHA1

      a41abae18aad8ecda0ee779e682708f4f9c59ec8

      SHA256

      7824296aca580b600114e6e1fc53033f6bf59b25bb5f2ec0d216d4a8dee1adca

      SHA512

      562930d8628c543a4719546bf9a17fa277837a3064d0ce69f9a97d43b4fca8f1e597c4c9c8f7ff3d5e23977c1515c1346dd4cdb33f0106021b34eaf340edb387

    • C:\Users\Admin\AppData\Local\Temp\~DF8489445D2FD26817.TMP

      Filesize

      16KB

      MD5

      390c92e7f0518558bba117e088ac4c5b

      SHA1

      6278f5969b1c50fb6dddcfdf7011f03b38c51d46

      SHA256

      8d7da2c455893e2fa58e9c1de85c8623a5a0eb026a4d5016f59f60d2f25f9c65

      SHA512

      496b3854bd8a5f4c3348429f24afca0e2ee542730e5a43fec1ab4357b9b9f7ace7a6d0c483ee8265748900731a12458f8ce22b8e73a37a8e91f3ecf887b1d02c

    • C:\Users\Admin\AppData\Local\Temp\~DFDB4FAC84F9ABDE7A.TMP

      Filesize

      16KB

      MD5

      82af649c071271dd0f3638d7733466ad

      SHA1

      8f1dbb61d757b81bc15f4434cc35000834811463

      SHA256

      200f3002386babc0d7afdc0486b9fa3928a181e51001cd4d1f06c2c1569d0736

      SHA512

      2de60afd0849ba75fcc0bda27fe3643bae866782b48293e1f317faef6cbd42dbf942251390ff408bae1a52f33fdcbc7d5a6cae3b0479092fda7e6fc1660486c8