Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    202s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 19:43

General

  • Target

    fmBpMIaaAiRfrFUG.pdf

  • Size

    18KB

  • MD5

    a69849b1c565370ae62dc50b961ac320

  • SHA1

    e585947018148e0adfb100f1646a210f657e94db

  • SHA256

    89c640d16395732611032c0a4ff179e1f10c8b829d2d91ca79ee2c5ef27d67ca

  • SHA512

    cf26e875657d7f4c053d9ffd571b3c50d4a94465ef15c45026414495f779ee0cc664ebee38f3c1a358193080a2cde0f117db176e2a97c912f14c589e21a499ae

  • SSDEEP

    384:8qXGRZmL739ryxFkZ2qMqj1IgmK4OSVaMK6a7vuP8QX7xMD:84GRgtWL62oSV7Xa741MD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fmBpMIaaAiRfrFUG.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.google.ad/amp/clck.ru/3DSS8m?hETGDafdgARSTDFCFGFGHhghghdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfg
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47485b5fb0503ecbddf1496541ac18bf

    SHA1

    2d91072f5a369d6b6d62ac61791018b208298903

    SHA256

    fa2ee66250c0cd4edba53f8bedd061ad702e8e0d10ecc573bde0b57423011e87

    SHA512

    3d637363f6844f0f51ce64f8dd2ad0115dc6e05581d4ca389b972a9f5f41dffcb970ac1b2349e3664abc54f6bbc2ceda5d6122351c7e04189f5ee692f3a8db7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b02ab0a5395ee7537918ba9632484fbd

    SHA1

    16ded75c371cec51cc02924046c942779cde03f2

    SHA256

    e601423226006d8964b18506fdf7039f14de1d91b30e75b3745067a164396601

    SHA512

    68d44c83f7873b5ef14b830d934f1a06e94b3ae46226bbb87c569152858d2f47b11d71224a4fdea7147daebb626a08daf9635ab3d9fcf4cc993a32ce71a75411

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c7d087d99b5c9dfc1288c252a4b7d53

    SHA1

    edfbd1383dbd1e51d3ad774b4ef654f45a3fce75

    SHA256

    1e810f33f8912a7b3cae8620ef284516c23bac29d544ff726e57447b79bc71e5

    SHA512

    c4b6aaab055d6402bfd6a47b248d3bb0916fe66873d9780cdf12fe2501f75fafa9003531b08f27b114e12779cd768636de2046fc0123c5ce84a07ca781fad262

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1d49d65daac3c38a82492c0d1380f21

    SHA1

    664d473ea72f7f753436121ba0b11df1ef809784

    SHA256

    12c8137dd6ecfa02668d3349f0e9a797fd6d828885a90e045733bf66eaaa89ac

    SHA512

    d67375a093a196592ba0206762c1a018e436d27f53cbc0f2664e21b17124dd2d483a3c3fb0fa98de2bacf9e21728574b80dffe12feb22feab6b50ed8de2bfac9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c178c40427cbec9a55c999b1d36235cd

    SHA1

    ef646d48f1697de31cfcd0da5ae5c6e9ba79d8d9

    SHA256

    f6b93248f85b743cd6648291934d6565dcfa96fabc98195851f2fc9de4ea8114

    SHA512

    b5fcecb07118cc69eb2791bfd0321fc413ecfc37381647bc87212dc84af9a7ca79c27383586c3eaa3199277daf46d484f540339ca54df07b041a8986c43111d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eaa3efea3166c09688489ec71cf78619

    SHA1

    fd589d9f115aba601b089210ce143999d4faa3d0

    SHA256

    da39d7f22cc86a47f0b0b0ffa9aaeb3b8f1e6f1318c3661a27f1498f74fd871a

    SHA512

    fe78c28bd8bd2ef8b4838dd07c84de59f43d19eae6f707f2b9d96c5691dbb0e4802313833b62d48c4e17d5092eab8744018775fd0ecda107fe6065ab9e4edf49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3856b7a8d790e07c8e377483e227a14

    SHA1

    b1b7e068c2194413600e505e76e2024c66796559

    SHA256

    bb25829f806d08d36a56036a85eab1766955e39557e27f4e6c92adc905d7c209

    SHA512

    7af3d19ec143eff6b0f3884dfbfb800d683214904e5488d90f6ed947cc14e3b1b15fa8d62b18e53a4fbd076630dff67c5fdde0ba7de8780c19098eede561bff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99e8fa5640d69f0a3fc6ddfd67bb0c48

    SHA1

    2a0526c65afce754c643af7f073c1064d6694f29

    SHA256

    6a19cda50fe46ffb6d90004649351da65e974bf4b78b8d945d043da2c461a283

    SHA512

    037693e131899be1afe4d0f6d4029ecab58a585ca7c531e39e8c522a6ad25e3082a41e91bace125b6628be085ef9952fbfc76b4dbbab8297ea079e7d2075f410

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b9f2cab040ef711f1c4c22f48dd0297

    SHA1

    25088481b9c8dd517577354816cf616021557240

    SHA256

    d8ead6d3084e9c1251f5eb29833a50219fdae0b20455e454c56a6893cbc5151d

    SHA512

    f1820c4cfae115039aed7321bc07fcc581eb6bb24d82fbbf2b59aeb54cd730f0f891783683f633b5aff281228be23d8e9262a72d3986896a04af288fa7a9a9fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e73c1683e10e6805b9749f395f78dfa

    SHA1

    c96734534903e97273a5386b02406c4a06d7f2a1

    SHA256

    c3fc58c96fa5dea6211823015d5743b7262b788da6d37a6a69695df66dfe2a21

    SHA512

    49571461dd4f8423ccda0b587c641e813ac462345a1d0be83e0cc2e0eb81d2055ee600b3181cf3750b21825b2a75ed5dd9730bfbfc163202a6c1f570ddb7b1e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b68f832fae5c386be8937cab712b765a

    SHA1

    c267cc090e969c849ad553a3d48c44489f327f9b

    SHA256

    9aca6f83ea072dc09591a70166d31058636dbef64488b0355c031a1510cba0b5

    SHA512

    d32156a02ea71cb80fbec2ebea38c6b581b53ca30b2592826485cf01d7a766f4670a32a389751bb608a764e5f944e3d83ef3a85ec5d7343c9955980bfc16799c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bb62b5590d8a017d14aa262ba694371

    SHA1

    7244c0b30bc2521620499120ff7a4650eb3b9e49

    SHA256

    6eaaab0764903829ceb5affcbcb68477f1dc2ca576dc82dedebbaf5c7f282a4b

    SHA512

    31b61caeab936264321dc8dd7d0550044f9a68f7458a8b9bfe5175a1d304d9e214f55c947935951f0b0339857215fff473dc438420f02457ec1ba69bd1c63d59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a19d87b65732b7b550d827fe6658e6f7

    SHA1

    5363b6cb9e0a8ef3c26d82a7a9b131c49285fc90

    SHA256

    2316d0144be974587a5b9177c80c1151a8fae2b3f49cd07fc7d79134d28ded99

    SHA512

    546411d9f83eccd522bb8009d403c5a88d9bae1cf24b7e519c19fee0e06434fa490a95c6675c2c77381b3fe981c7970391989a68227092a7c9e1fc12f605afda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    541b677f1823e67fed11474e700991c0

    SHA1

    5ebde0d25a1793a84b65a4eb8891706b2171f601

    SHA256

    dadf868a143c478e48f8b7c4efa55b1d24c0841e1e6c8ef1b7ca6d296517f27d

    SHA512

    362c3f7516cf2864b281720837c34e000c6b2e344aee0532bf66ed0e0ffa824130e0b736f619b8e3d490fa0d232322c0f6058f027d202e63efaea508fba91a96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a7715d7bde737278e349ecb865c6925

    SHA1

    699ca7d29170a2ce00e63624638f03199ecbc550

    SHA256

    88a6c1caeabf189ba58aaaf6dd7e8f046a291096aff3646ed43f276d3b0aa2d3

    SHA512

    7914ab989c0181002c741f4fc15e4213e1bfef4c4ed0fec67402b926120b21f9f2aaba53a5fccc5a3555f883c6d1c655ef583a4af3c67d41508c6a6238c50a43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b43e6d5fe66e24dfa0cd7b259c765ae2

    SHA1

    4644cf1beb2cb874c9c4c4a803c95968963b9a67

    SHA256

    e12864be8045b7a37056b3c1d795cc404dca0b14415e8d7dcc9dc87677afa008

    SHA512

    5c2474d005babcb867ecf4509b063a8963893281d57436854fc4097aa925d19be79367c25b5a06670dde975e8f39f593da5343dd21d1acb70db6000c874bc68d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f741651d02deb3c7d6c47c564b90a86

    SHA1

    1ceb49608a201e4911f4161691d9c3f8e5088eef

    SHA256

    a8a3491eae2eed4328088a82cdd03a8855337de0979def137a84687089b87500

    SHA512

    a358d1c0172d821d9594d7e6a3237a1de45c2fe11fa911d75b88861cc55fdc7d7be281e957d9103b296eef7c2cb5931cacba3361e9297f5d71b68a2aff69c074

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9c03b580bd01ae0561d825f10b22f02

    SHA1

    6130d5291cdd1b2ba94a45ac096057a9e5bb6b5f

    SHA256

    bdc5f5d7446b16f914f1888be3ac2727c8a7c40758001b6cbf452c4f7f824c25

    SHA512

    53a515ab633f6c2990a48b8026e5fd450619bddb9ab40af4e1fb80a71f8900a925a6099b922cc65ebf1d94000883b02884b20718a21f2ebce9bbcf3f661bc777

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3978c2d928315468b444c70d82ccf172

    SHA1

    47e1cf1310eaa40672b38ac6b603dd6e2b471d56

    SHA256

    183a9b2fcd508c29bbd159e57cf86d6a3bdf1cb3db852c2598ad4f580a936a49

    SHA512

    3a9fb4ddaa3e24b67a85b7100de44b55297a16e57ee7e3cc8ebc3cbe9081d45765ff000bbf2cccd0e1b7161148d48a4f475c138bf1da635186e88e8687183aee

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9fajjbh\imagestore.dat

    Filesize

    1KB

    MD5

    10f55918577a1293c805d3856d2c0bbc

    SHA1

    84612a1cc5c31187b009ad2c8baa8aaa8d32776d

    SHA256

    aaa40eebdba8fcf32d16016a5c6bb8dadc117baf09181a39dec25d995f40c6d1

    SHA512

    2ed89a36e21c7abf867ecdeb9f24edf8255f27c9ad9a74022f37da0053179dae985d09b1aeaea55a7162bccdcae998a062e2d5a4926e8260b17c3534cd8e2f4e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\favicon[1].png

    Filesize

    1KB

    MD5

    d0ab0fb79e2687c9773cfa4018595dbd

    SHA1

    d79836a5df12dae77b9cfb0c34e382b6257bdd94

    SHA256

    f1cacb91db22e156f7f11cf755ab73bcaf30c058efe51b398cb425482113f411

    SHA512

    1283b86a01b8121f9f86f15d6bcc19fbef8c3670d992aee3915d0be7b215eaaac2b9527df1f6675e4ea3a2f417b6c73661814e0cc71320dd0baf39420f5cab83

  • C:\Users\Admin\AppData\Local\Temp\Cab1871.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1874.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    342cf1f517a4dc80fad5275000dd1f56

    SHA1

    79d59cf083cb9f2902ae5632df29b7c16f9c1d27

    SHA256

    906b04ad83d5c013debc2a808c3af025c857e41b3171def5262d0c381e88f9c0

    SHA512

    e88091aa3d3ad5909e9d35c1abfc5d304176172797a9857f9df7eee708de72afd1e92155834b6ff3878dd15aa8668b15e5129bb223c07c68e3123005748e3336