Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/09/2024, 14:38 UTC

240921-rzwcgsxcke 10

Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 14:38 UTC

General

  • Target

    BlitzedGrabberV12-main/BlitzedGrabberV12.exe.xml

  • Size

    319B

  • MD5

    a92db228102d690d07828f71a4171b70

  • SHA1

    e7ff5e84a7932456df217e4775ad2c4b54f95521

  • SHA256

    d4ff8811d9ca86df9fdc62cc0d5395947683456997a0599dedd3606f9eda3d44

  • SHA512

    0018e4c3d88a74a35682a5c46bff4bd8887d717fad464adfc31eaf8e69859b4406b1488e2e483b41c72195b00580e9b0b6b1eb3495004542ff728b54a64e7472

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:972

Network

    No results found
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    799 B
    7.8kB
    10
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    883 B
    7.8kB
    11
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    827 B
    7.8kB
    10
    12
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbbc8f76eb4cb1498975101c6ec0933d

    SHA1

    9f8f9adc27bb4fd89615159baf67216426395628

    SHA256

    e115555c4fafebdad2450066449d6b423138c6f76d5b3cbac5ef6555da5b4d72

    SHA512

    086229d37b8afb5c685fcb6890c3fedbedd6a69781da10f90f7e49c2fbedf11fbc726823b4e43d30a363e6f2d1ecfeda718789ee4109f70869aa352ed0327457

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    592a577474c7349df4ae73f2441194d7

    SHA1

    cd9bf3cb8ba3d4b2894d06550b3658ab4078f587

    SHA256

    ae947695ac40c55211e618f700e9f8e06609e86733e41cd8a700fbaeb476199a

    SHA512

    29e2c110a4fad2773bb539b493a49417e180a98ac5551f46baab312a3ce3c1f49004dde4341fd2daa223e2f713c56217023e10cd6402efdad79f86b7c584154c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d1c330c290e4b8b40a87732d36e1e8f

    SHA1

    5866c14bce069fe818f7bc07ec33f60f58aa3f6b

    SHA256

    03a852ed63f6eea139636184b6d712b09a1dc0ecef77102e011688536ad17c7c

    SHA512

    ad73c1a581858b3bc146644a8493b6063adb5b65681948a8670d3475fc13abc2e3f182f29075ef0786f9285194805f2c85c4d9a97f7476b7d4a9ed26fa8c1045

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6fdbcea59cbd084c9ef28da5dce26df

    SHA1

    1882f4ad0902f1c181488294b3b65c847d0c0908

    SHA256

    22d0b2d05f18dba4ce0313857c61af1b167aa484a419d6b1881faf0dadfa8de2

    SHA512

    82ffaad74bd96ef4f92d6875081ef5864f027c0c762e4e41fbd27559a89b81ffd26865fd880f94d8a398bb89e4900e2f4c9790e134c904639d59ab51738aa392

  • C:\Users\Admin\AppData\Local\Temp\Cab8F9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD9E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.