Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 05:03

General

  • Target

    $TEMP/setup.exe

  • Size

    1.0MB

  • MD5

    c54a5bfcba4d9fbe1642188b068bc1e4

  • SHA1

    f75f0f4818f53882ab4816d6db8043ecb7306c2c

  • SHA256

    57cdd25b0f1d9e6db58d10cdbc49850e2fd71826ec637646703d97df9c148353

  • SHA512

    92bd4b7317306f6aebf2f5b72f278908b1326bffe4c4c18fa4d82c9ca4c91d167412b3893c24c12bc0d399d48faf2e4159c60fd7f8a80bfe566258be1a9350ae

  • SSDEEP

    24576:sT+PJtXA2ycphiKh77X0A/zEPTRlwp7KwcpgoUMcSa3Hww:m+jXA23h/970A/iU1HDSa3Hww

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ardamax.com/keylogger/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4dee0a22fd8c53c0da31b4082f5c544

    SHA1

    d2f546947a99f0184d052b5f29c2bdc1753d879d

    SHA256

    55ad1211f993bb24f14449df574ead022694f29b686653ce47f9d92b653eadec

    SHA512

    eb16efb4f6375aa84264b4098d4a188433c3c8c7b99176f0bdc0104b4ed4000b41f94c6aefb2c7e3431df2d558c8ef04c95b34276b071e418a26f77410474ca5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8362ced47d42c4305dfd2566b342aa0f

    SHA1

    d4315a156b6d580bdc724f4f0e35d0794bb992a0

    SHA256

    77f0fc7e7aadd2dc1867c93710007e853ac6dde222c682d92e27dc1c51e4f02e

    SHA512

    ab7078ede0cff31fb396dd0b297e313d45a0141cce1f9041b3bbd9a36080bc614134abc9494dc8e9678dbce020e175bb1272f0e4bb08075bcc973211d39ef242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84aa6ffe92da2f52b5dccbe3105904d7

    SHA1

    3d708830f1dbc78e80088ea32cde7fde1c74ced8

    SHA256

    d770efb225cf983c020e27e45a5e26920f72783ee2c8436d268e9ed9f6bc50d6

    SHA512

    fd1e9330eb84d9a6ba2d7f898f719c151ac978e3d13769db869a0396c2fb19857680dcb215267d7e2ce0f205e30d29d76426d608c9898ad0868863bc28acfe70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a0b266e57ef20996f3ef492b8aae801

    SHA1

    5804ec9a7ae411fa25416d0ab95b4f8292d2722e

    SHA256

    fe122ca4913ac0b4562382eefbc4ff0a67196cf2737a6297808034f6eaf97341

    SHA512

    1efbfd95b4a9fe6c6d2ab36a12f89854ad413c20625a41bf972d53e763fe494f09fd74a80322866ca1e59a38177ba1ba09906f44540e707219cfc0f03daee2b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1438461d58abde67a94636d394c0b332

    SHA1

    12f9173eb2adfbe68f6ed707c9bb5df306a26a7d

    SHA256

    c614f3930969a260fb792dc532fe58b0c3fff2012bfb74b6d759ddd41aec5b1b

    SHA512

    1ee1c8bab69aefc1e1f2332c428c2a6ffbb5ee92b53efea89d95c65e7ef770a3bd6db8c5ea20d5dc1eaa81c86ab64de7df67b4a3843d8973cad7beb6851b9735

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7156e85c7b87862d1a5a37d710d36b3e

    SHA1

    066dae377397c2c1b6f12ffdfed5abf7abd1b1be

    SHA256

    39dffb91b9fba3f91657e24a95a2410d047cd9f0364c71ea93f6f1d3cabfb2c0

    SHA512

    2a76e1f13e020ee05a51840ae37aaeb7eb79eb58bcfcb1f4d8642b7610c30103c37dbcee627fe57a7dbadf678ceb0603c1cce5171fcbde92d6928d86f2024a94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    091dd6c41003ce150a8a59c384abfcfd

    SHA1

    8d8bce994321a7179c8bdb5825edbd57af3e09ec

    SHA256

    b620c9c41982c8e50e75c535725d957c3e19d8d9c23558cb211155bce26497d0

    SHA512

    5e2af13ac6112d49a4670b78ed8393ec0e0977036a62aa9c242c1314f70a48c3e21e3a5c4541cef5790cd5937f6da8f85a035b53ca6a88b3b2c70cf58fb6989d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    996b8fb643684f39ff4bfcca2f533706

    SHA1

    ce5df67be8338f72235083d7723f3df1b668def9

    SHA256

    075fc909985f035930732c793eba0c17f4bebb01de286601d0a7ff2222606140

    SHA512

    ee7ad633409550ef1860b8621c0931cf361b8e7d0927161622822a1b43078508fc19ce819c8b68c6accd6a732c2cfdb73facc51c169eebfbef30f68c598a67ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d8762bcfb754df8ae7647af1d6018cf

    SHA1

    259f7d3150bf7b3b4cecb13020ed15623fbbe511

    SHA256

    177bbd7a26dd31c522544b4f681f5afb3d10577797e2bad310d6873ab43347fb

    SHA512

    a3fdc1a8f24cfdfbf08a2cec26ba7d542a781298eca2a43c87978d3343b92812cc8c657ce5a4b85228bdbba86c0e1e767c95581f84ccc30eb9f3515dae08ce95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dae722a9bfb8bdd3fd6bbdc587accef

    SHA1

    3868917a7b39f612df0fcf0a9e0dea85cab6a270

    SHA256

    a5dbeac761dff9ff7ea4d78f302d62b97c5dccf727644a8f74b479f5f9290ff8

    SHA512

    1cf0bf4ea817aa16397d5844f82568fc2048ef53ee318768e97b9b5e22f3f7518fc95b760ea0f4d90dad8a78a80873b5c0c1dec8a91c7c0267bdcd9d0f1b0448

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faa8ba8c77b95fac40b52461fa4b4f49

    SHA1

    0ed597960cc20e71792374d1005aa239f842df30

    SHA256

    e2497107f0bedd08e8c039e281c723bc2abdaa4763c0753f0649472a657c6363

    SHA512

    ac912f786361c33fd3f2b4d49af6f3be6e54af241f44f83abeb8dc7f1ee516955800e702c83fb5445e1da16f87715fc95c17649af2d536b5d7e50fee93f2c514

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    338257e49b98a3aa4a2120f617612cf6

    SHA1

    ff5642909229db2502b6ff9cb3b53ea845e2fcee

    SHA256

    dfae8037c7dcab98b0456935a94d222fcd08d846504f8204051f8449bd75c113

    SHA512

    14b1b798fe37427a74528116b40697b70208d1b508b4feef4213a6aa9597be34a6970bf4a732d0e1b837ef7183b4433bcd059d4ba12f1739abc0e5eabb7578e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56c0c0992220b55dd981975ad785370c

    SHA1

    501be4b86b62a4e0b753a0480f335a63e9ed391a

    SHA256

    6861c59f4a7132588f0ce4e7002a3c0b6f46a4626e31a9e8f7410c165671dcc2

    SHA512

    12bbdcb57b340f42d766a298b360d23dded5606c19cfdd9805eae1e3f36cc059b40f3a39f3a545ab26aafd078ff2ae5bcd18a5f309dcc2ca4b4d0013094303df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3a7c8c6d428e3084c9064aa3508e4e9

    SHA1

    0968b5266b5746485681d680cca14f033f62efa0

    SHA256

    1eab04b833ac7cb874d5ca1a8c004e197dcad4770cc439e3db4bd155b6f6ea79

    SHA512

    d99826638a277a6225dffc0f006b2e5bd8a2f74b699f981eeb8795cc40350231c57b798a7c86e6dfbddcae0f881eba2e27cb2348e11252be42eb0627ecdacfc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    322d5461f638eb8b60d5f9b6d2f2ce5f

    SHA1

    3aa31bab0c8bf8f6c99f4ead5139da3ebcce235b

    SHA256

    2244fbab53b2287c24fee653e6cdceb5fb2b9527da7a10122daaf7f0dcf5acb9

    SHA512

    7e6c518cd26e3ad5cb47d98cf3cfd6bb7f3cb2e2007115d1c2728628ddb531d42bfb90c67c87257f8372bbbe9af25d5ca12c16887dad3206494c084efb465ca1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    423c9193ea0fc6f7d0708804a252f0ea

    SHA1

    1a90433d8b6cf3102c67ec647b1f77aeee7f68b0

    SHA256

    808a57dc22958a1708400fb4c18550f66f11055c49be8704996340f1e944e121

    SHA512

    817d03b304e619054c565782b68c9327bd4e1dbbec0c526e9f0e6e357fb04dd0299f2b58a5d726e18db69534f35a7635ed6719de2392404101a7dca3d2fceb5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1a7f61e4ff209a72889e566e056cbb0

    SHA1

    dc8051403cf0342e2b8c957ddc7a2e60666ac85d

    SHA256

    140710d6293ea79116ef13285b5dbf7933a4910e5318af7d4820a745c08e209a

    SHA512

    9911c5f348a43f023db71670d159978baa336783cac0b19ff6338f55b35d46161588b5566c50d7bb82304c10a505bc4d6a030f84e591645a81d22774bf804c63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b743aeef7138c654318c7388132bb72

    SHA1

    f7bf2d60daf176432e9db6d3e100172810bd4dbe

    SHA256

    2b774bcef9d6fbfa76239cf5479cbac077ab741e060a46f3a3195b7628d061a5

    SHA512

    a0f95f96311f3938e01a5614f23980cd739de3371374fa7f2b8d72ee23e6ca1742fb290d689cdac8e859d34251f46af7f31ff7e19670123bd2f46b1cc5bd020e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95c8fd2d7ab1d3b3e336403bdbe620a0

    SHA1

    c73219cc91defbc751f25b4e885baa51943b3a91

    SHA256

    a9aa60baf6060935482aff4d3b45eb20925e395786f47b9987804a68be9383c4

    SHA512

    84e799babd8bc35834089ebb5b2cd759f3407f801de7c36b42f0cbf0e5c2ed4d2a2e5ea2886b521f9d36e4a35a46f1fd0ba2f72765ccd416a949bb55560f2d1c

  • C:\Users\Admin\AppData\Local\Temp\CabECD2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarED71.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsdAE88.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsdAE88.tmp\UAC.dll

    Filesize

    13KB

    MD5

    7f56c0d6a8733dec142814ed5a58b0ee

    SHA1

    c119e66f179cfb758966f3cf878466057bea1840

    SHA256

    86445396775370aff5834f10bda25e505b6f89efc69a04fe1ce46f5d128be73f

    SHA512

    8b3b9bed985b3583b7be8b2197bb068e5d5508f8b5c4a7fc1278b2662dc8d9a53fd6df63f636e44bfc5aa37f030ac76b8d259d6b446bf87d5c72b74ff5b158f3