Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/09/2024, 10:19

240921-mcrnkaxbpa 3

21/09/2024, 10:18

240921-mb4azaxble 3

21/09/2024, 09:56

240921-lytjlsweka 10

Analysis

  • max time kernel
    38s
  • max time network
    14s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21/09/2024, 10:18

General

  • Target

    MV Medi Aero IMO NO 9708966 00877 -xlxs.exe

  • Size

    434KB

  • MD5

    fe42b52214d984619bf7c42d73bc7980

  • SHA1

    4dd5052bbfcb6d37a636decae1d8bc03f5c355a7

  • SHA256

    98a050f19567bb930538a9656904f62036a9bee4f3f08c24463d6777cd87eabf

  • SHA512

    1f1ddf27221adff8884c239c85c35e8c1d2a0acefe7569bb4a1f7fa1815e37c095b5108a4fed08f465a99e593eaa8d0883af2946c4f531a57d5203f5ccc296d6

  • SSDEEP

    12288:sYKYjP6eP97rBuR0IXXp2ExYu3fOzVaoXXl8EkZO:d3jP6+7ronpJr3fQVNn

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MV Medi Aero IMO NO 9708966 00877 -xlxs.exe
    "C:\Users\Admin\AppData\Local\Temp\MV Medi Aero IMO NO 9708966 00877 -xlxs.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3956
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2092
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\UnprotectRestore.gif
      1⤵
      • Modifies Internet Explorer settings
      PID:2380
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      cd6829f53a60318a54648f4ff9d694c2

      SHA1

      eda672c23f219a9cdbe740079412f5fbe04a157d

      SHA256

      5410184dfd5ef071de14c78cc7e9488049a85e313a3454250d53e974251ac906

      SHA512

      25a54ac013419868211b704a9b1f4cbc7c0a5b1a0e10cec09cd8eee3fbde7497e36c8e35f0506622eb9a47939c2c6b9590bf9bbf8d43508be13d7f85f7838ec9

    • memory/3956-0-0x000000007496E000-0x000000007496F000-memory.dmp

      Filesize

      4KB

    • memory/3956-1-0x00000000001B0000-0x0000000000222000-memory.dmp

      Filesize

      456KB

    • memory/3956-2-0x00000000051B0000-0x0000000005756000-memory.dmp

      Filesize

      5.6MB

    • memory/3956-3-0x0000000004CE0000-0x0000000004D72000-memory.dmp

      Filesize

      584KB

    • memory/3956-4-0x0000000004E80000-0x0000000004E8A000-memory.dmp

      Filesize

      40KB

    • memory/3956-5-0x0000000074960000-0x0000000075111000-memory.dmp

      Filesize

      7.7MB

    • memory/3956-6-0x0000000006000000-0x000000000609C000-memory.dmp

      Filesize

      624KB

    • memory/3956-7-0x0000000005090000-0x00000000050A2000-memory.dmp

      Filesize

      72KB

    • memory/3956-8-0x000000007496E000-0x000000007496F000-memory.dmp

      Filesize

      4KB

    • memory/3956-9-0x0000000074960000-0x0000000075111000-memory.dmp

      Filesize

      7.7MB