Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/09/2024, 20:30

240921-zafjqssane 3

21/09/2024, 10:58

240921-m2x7msyfnq 1

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 20:30

General

  • Target

    [Content_Types].xml

  • Size

    1KB

  • MD5

    d574e2590629b6b97b2080b1e9045138

  • SHA1

    932d309e8dd75252f046fc8f8fa09b04eaa037d2

  • SHA256

    e4b1f1ee8b460eb9fdfb5f79a29dc4ccc790aa9393ea97a270c96a1bbdfbd125

  • SHA512

    92d95297fbb75449448d2640fa02c5b751c66c4ced44638bc92dba3eeb9c2a510031d982e8049d84cbddd645ab3bd549a9198c92ea96fa2224e05ec00ba43e2a

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\[Content_Types].xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dd24552016da4f41fddbe377d29fccd

    SHA1

    38e3c64357afec9dfa2937a02a021b4e8701df21

    SHA256

    eab5fb67e75ecc5c330642b9325011e9ec26f4dfcff38b057652b46ad5c74bce

    SHA512

    09c6a04b6e41b754c4473c2bba01616aedb893706c53277d1a0a83b4f93294b571c1816afaf626c0f971706f9ca783c81a47633ba4a0925c9b726f3817aab2c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c89e1179270cdf98d185e630590d084

    SHA1

    196f79ceabc3a242de5bab609531a63d3ae1c0f9

    SHA256

    db74b1415d36c87e59f6a16a734d7cb2d8aa92bc3bb49b1306a2a9befe82f364

    SHA512

    20292073af63df0d24f1815566578d6776c9b1fd5bb03c4897cfd6ea5d81968e17fc36426e390c07e1f0dd28f36e9256f297989075562f9094ae823e43967b46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66a7168cf567e76aae31db80b8904f67

    SHA1

    0e17a0b943f9134ac2da38ef752c598bb1f5e030

    SHA256

    57c133d60e16fa27104c727fc550d933200f04f6e505868f555a90cd8fcf7508

    SHA512

    1de368203ec164f7bb10d41fc41a74b4a320ed77c12fd788cfe0198a98a39b8a490723ad58eea2b2986744ccefbd967a1f86cbb2b0cfc1d514aefdd9d1914580

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02e24f1106d18326b29ea84e9060b09c

    SHA1

    7bb1befc166557ccc765b897a0c4e0e50b2e8ee3

    SHA256

    bd0657dcd94b4804bbebf0132e4c565f0199edf8b46760aad6f8ae18a4126c5b

    SHA512

    3cae2e76d83112b3b22a54119e97ccdfb4b60f989573b2275487b9ad5c3a8dcdbb37b51a614a217491cb56fa7cd37396d8e2905aafcc3b2f37b88d352d1eec5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85ee29e1d7b8a02ce16e30e7e8883b0e

    SHA1

    1e022d961d82459587b16284d7cb52926a45e29f

    SHA256

    aa19616b499d1f8ead86e1ff72fd530c7602ffd47b129651d7ae6e83bb84b2c7

    SHA512

    39886370ec33ca8c71f610733753360dc0b59f9426e3b5c7dd4ec0269dd21869dfcd16a08e35e78b4505fa5e60c301d3402ea9d372e70a2ecaabfa0c872b3fee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6762e714cb31a26526c1d1914409318

    SHA1

    086b7f6664d7e4bc1ddcab04fd35e9f963b0e535

    SHA256

    fa921a4a668da1df9fc84bce8e94e836d46de38d551e9d066ebc937c0b830973

    SHA512

    315614946235b10ff842f3f97a222fe7b6974b9db51978e828bf5abbd4b82a94a7a9c4f4d494d580826d628af744893ce6900e4d4b827123fa6d0f5fb7abb22d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f27fc1d391ced4782a0880ccc0548c78

    SHA1

    337561b168bcf23a2438d11fb6edee0cd83a3300

    SHA256

    3d24d3a8ac151612ae254aa631e210e6cfa533ad971a1deda501d3385d9e41a1

    SHA512

    f9bf9b138263fec7176c028e514b1628c8fc8279bebc9ffbef907ececb8bb0cdbac0600a2e1cd87818c21cfbd42cfabfd309b7af92bffdcd508c7e656ef0a4e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa4af7affbfba0c30c371db1d59e36ca

    SHA1

    f1a20eb4c926a8087915e58a51608a826d41a535

    SHA256

    e0ebf117b061bc128ffeac32de9b6322d1ea8ed50a3d31606f525c9817468022

    SHA512

    6827424ecb875ab6306ba705c8883d89158665386f945527d1a3af1a5059aeed28d24fd834ad432896f5f9e3be80bdedf9e99886279008a3dff1a5e95361d222

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fb0b008f025d4e27eba7c3e33543810

    SHA1

    c2a837d3aa4fe77bce2d9e59c44055132c57deab

    SHA256

    3a0804eb1ba09bdf91be53acc9387577a796279e79fd6f92ded054d32545a361

    SHA512

    57b462ed76f8068234d95fa6b4448cc3d2d89da4a83ae11add44731f1fc09fa926d64004c181fbebc7d23ad4dce838ce1cd96cc38dd61e8ceb109ddce0fad910

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    985fdfe2ee8a11654242f11a6e22ee7e

    SHA1

    c86ea107f9be232b89c3571c422a4e46ab681925

    SHA256

    7c2cfb9292e8f6340bd737f94f87cda1cc2c7dd1ba80b7fc6ed536c75fa05e73

    SHA512

    c4bf71648ef854ac7e227592c1229698c3c042c1e141736a0a71544a9bada3aa404bf0424f102923e44fd221760c74ad416ae1b9ac047dc432a488b1799e5185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dff266561abfb996f575d5eb741d322

    SHA1

    9d0e8d5fe99899933a37ca9845a2aebfbe0d7082

    SHA256

    ebbc405d56bd4c9d122b3d9a1a563ef5486c0e3a4774298e63f477c0f8248425

    SHA512

    85180ffd1276bcaf4a8bcbcbc9448335d57648775837bbde433c3a17e6912d79162f1b3dbb3a84a39c75be56d59568ffa5f1ea7ae5ed263729d9a995fdebb136

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2fbe2b1d395e583c1adec1ab81a78c0

    SHA1

    f0539f7acb97a78753c60e36821cf9da7d950fa3

    SHA256

    715922b3d264c76cae2dabdc56a19df41059bb9d165aa7914ba33c0ea6c209b6

    SHA512

    91bba2fe0bb8c9f8cd47bc6d424e6b67e47ce88bac8007983bfb4c82e5a03dc8531549690d7e428fa3f4523bdb91a8c34f7f8b57d5f0e06cd0d1eb0c69f56ab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cea8662ec23637bcec83cc0770e60b0

    SHA1

    abdcbf3a8c8b49c106094b29306b37327b8206b0

    SHA256

    a2c29218102e2174ee448dfed53f0d9103efd3eb1f92e7b61695f261f5a951e8

    SHA512

    9d99cb98f1d7ebad912a55df458407b820812aa44ced881659c6b19fc6e61657627047009f3400d3bd75f2de85f341d1a9db9d86177c6cc8e04a1acba0760899

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a87a14306fa929a3d5c2669d2722b9ed

    SHA1

    7bf8f5abb759f55b9f2a3c25eb6593df0a910994

    SHA256

    f5973382f30d9d6d5c6ae8307ab551e1b5f60c76c9b0a27c7fd245c396cb3f79

    SHA512

    ce202dfa5e2a48c703a2b68738ccb91ea0d81df47361581b3dd9d805aa7f0a5b809afb7fb8d1722a981fda2062a86638567708fc2f5641f6b8cd1234b9f52062

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfcf933a6499480a2835dac037f142e7

    SHA1

    a7afd307d7514551d60b7257251ec01f0cb2957a

    SHA256

    5f0a4a8dd618adb65ea8aba23cf1e56ef6622d81ec43be61c5d28b10af7a13e8

    SHA512

    62aeee2c785a526d5497e6b7e7a75881069ffbc35c1068daf4fb3ce742eeef3bf226c3d6eb918c614c36ea36dbf8fcbea871aef3f41e135381969bb4c214d19d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3658c70d0a696187f8262d0484b5d473

    SHA1

    aa925fa96599145aece622c3d2be66a2e9114596

    SHA256

    68a1b5a10d80e45135c9691bcfdb0d68a91f60a463e8ec7ca759ddb1a50c1838

    SHA512

    0d843dd9e0219d60be0b142e037a315a694fec0728a2fecfcb02da215e946efab91f36358f3cf494c98153891b9b6949cf2e945887a3158f74683cbd468d0e36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1356d6d29ad2adf1e073d2b1030f199f

    SHA1

    bb15762b20d03d7337ecc1f47026d2c048c75675

    SHA256

    3ceeedf8dce09201daaae6eac73e1418bb5042d9f4b80fe627f14468c405511f

    SHA512

    eea3a85b5aa32f77f409897f340f579f1a33621d90829c3a0e22d58acfc95eccb2ea33a9c7cfcf8c3d1727f9a5851fb82d2d6b0877be25d7d87f0aa029a82a0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ce623b57e8da6880739e7622a8fd159

    SHA1

    dd6cf5e616b55f836109b9de41c2e2021764cd13

    SHA256

    88e2b8167fc93ccb1ff2253699f18379c760f410b74782046708777a3c56aefd

    SHA512

    9c91082fdc0814244956660f233507395caedfd733b23f3cb4d881a7bc2d7747d6a7497ed1d7c87790ef8dc9d3b84bfcd9b7c7db0a8f424c3af8eb00557e18cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f664e6c062915994b5a4ec1e11aa63c

    SHA1

    1cd7686b532a13268cb85ae75223a3869f942f0e

    SHA256

    b2dc34959adb9c5134cd0a7a912d7baf209b8de328463a1bc8676bb6cf40b0e7

    SHA512

    901a7c0371555dcd7d851ac767b0f709fb133cbe08d2fc59112b57814c654fc415c7a14950c83fd32548ca3e84ee1a69f2b1bdb4b202a001c1ae088034bf62ac

  • C:\Users\Admin\AppData\Local\Temp\CabBC7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC37.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b