Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 15:16

General

  • Target

    00008030-000E4CEC1187802E.xml

  • Size

    9KB

  • MD5

    78dfa910037dfff19f2ddf228a787bf5

  • SHA1

    7a802e42cff252e48e267a2f268411aa5474ebb3

  • SHA256

    ccd7efd616eaf2a34fa7c0d209249ad5d60dd218d57fc24b4c6c2bee0c49d17a

  • SHA512

    928fc8f48370e89fa49603f44080724560985dd67a55a62a6f214441dfb4fa007c0c2a5dbbd661bd10b6d7b28d45d8ba5b6736f38324e9c218a5edd139268b6d

  • SSDEEP

    192:XM7x6mzOKdUxzhIyP6fmH7lwVvNNjVJZcoSjT+NYLJsh8ae7NUomZiH:8N6g4xzT6f4ANNjeoSjAGu8Zmo7H

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\00008030-000E4CEC1187802E.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed45b062a29deb7fa66063d59c994fd8

    SHA1

    ad157b9128e8f0cbc94b026e001c6039597cb672

    SHA256

    4b31367f047ecdd7ed0528d482c2b030ba13d16673111090620b8b2b63ad17cb

    SHA512

    44efc36c1edd53fb3a19b589fde150351c4910cdca1b5a8ddfcd465f3b1abab0019910c9323f3fda3e72ee5fdf000d3c1e189b6493c3de1c48aa42629d68bb70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3c1477cbf7e681d3538212e7efeb9fd

    SHA1

    683491702c8af71c11653a90c7b8b56209bf2e25

    SHA256

    ae529ab6bfd466265c4f147eec6e76a58b1dce1d02937449bcac891d72309b17

    SHA512

    e69c00f1cfb4cb96f8efb9b39a8338b18a7d1277d73d1f8d5f8914ae80bf8571244eb5c7151deaae1c292f1cdd27db477fe13860edf8ea67df638fbbbbb3a754

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e42318c0664f7a4d8172d189aaf4628

    SHA1

    e3ee287a6803cacb37cfa0e3d21cd9ac8d62e46e

    SHA256

    6439d889d08b857b947e0a9079b6623db9575337894eae7e4b1411290af4bc02

    SHA512

    08db0146c8f58dc1f0f67b700716846d8681a9572c93642ff195a7653356a6c04a23682507a8a01905440342d95250f990d7e6712c8ea5e51b294d772550b49f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30036168bf45364a7528e4526d3a8780

    SHA1

    5c859fb6fc70c88b3fef996005257db6609e664b

    SHA256

    884d43a6a0bb57485b0acae1a4a347cda894a50c84f6c90b810377d535b1f9e4

    SHA512

    9f3e4e43e1dcfdebf798dcc7aeb627ebe0e904ed8cac3a805e600c1c7802a2d433f95fc8b48b8c35f2873d12388f49861031cb65f4fbe5e0cd443b0b4f68ffcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77659a80afb5a0bc2cc4922b67fd0b51

    SHA1

    3f7443e663a0611d62415ea72107f625a98bc75b

    SHA256

    a1b7cca6cb90aeb4da154e752e4a3e55ec34cd83d2bcefec3b63ed9e12029876

    SHA512

    41354e4f6750b7ed2f16032d77fcc8432d1beb34459e77c5c1ec749fbd7a3d4d92051073f258a8bafa80a7bb7221556cf8a61ecd3a7a9aa12bac982afca4cd6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7837a02ea2de0675228ad45887c3da56

    SHA1

    681abb91a4155970d2852b277a0626066e8b5a8e

    SHA256

    8f46773bf0b8bc2db750bbbf933568fce19d3a02a01655cb340e89ef17d8f96e

    SHA512

    370fa63ac6bd57e46fef8fb493b2be423383781ae17810be79a4e8561bbc6b2b17a4c86055f6ce4e230c328dbe0b03bbee5498a0673aef787a5b301696037c7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c63ad3a5ac238892d792aaf5204369cd

    SHA1

    e467a3e90f0da48b7e49d3fd865f8269f41f71be

    SHA256

    ffa4b24c637e1890439d387099a157dedf69463fffb3cad16eaa8ba6cb7f9286

    SHA512

    e54d14846ade3819557d083c418c5cdb8b7961b43761119199abafabd70aa1bac9b46415c0e9378b69615a59f9c559ff0cebcbf785f95ad44a3fbe30452db912

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47c19df6517b96614accd7536b4699a0

    SHA1

    f7cc8edbebb8e6ba27d93acd770e1b976691f4b2

    SHA256

    ee1170b67899cca76936db12827e9e3e16efcde3d651998868149eff3c1af545

    SHA512

    613b655a4dc3a6de8989255369d03c45351bff0b1807859401b901cdb592c9c48853788be36e00baf8731edf0ae9d967583b270996cffd506f1da5ac9763d9f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9020af53ba08e5db7e5822744da2fe8

    SHA1

    3893be56f84322a0c7719edb2a880f5a80df9591

    SHA256

    f4ad4df4e3118b634a70eb972ad9390ec2b9de35350d1cd38927a4b270fd68ad

    SHA512

    13ee738ad549751c12ae9c860ccd0173c52d674e7357b7b3c27a116255c5465d2943d832ec902628f9438110c969599d8f737cf271c46adb40753e595402e677

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3588e8b0813a3d46e845acc73ead51e8

    SHA1

    bc8fa5612074966c75bcc7e4f055527d713ab60c

    SHA256

    38c98db004ff7148ea23863b12f2662cef4341e3e57fad56dc73672fc640a5a1

    SHA512

    b80af928d1ba88ad61740aebcde9368eeba8a5c976e15993c745cdaa4b78515e24f8a861c98def638235e76fe25b6c6fe0e454c687029b452c0c07242945dea0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ac2a99cbe71c9d30643c5a3c89d5392

    SHA1

    518cb67c0aac2e71b15c60a8573ba74d195861de

    SHA256

    0a8230c989862ade27db4a3f4745f7b7eff422a24abe76a22ca9568570b7a04d

    SHA512

    d48953c8977fed110c90a83e3cf5eacdd14266e9a07ed464fec25991ff1832cbe049f7877699fda3faef6d3a4721d49c9070f7513fe1827c2ac3653c279cf7f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74b2284eec6ceb50e60ee3228a5828ff

    SHA1

    d16d3d0ac526bf6923419ee411b3d34101062cc8

    SHA256

    b22ebbabe5144eb4b821b9dc4d39fb73b1bd3643603244fe7eeb8dd16cc8d42a

    SHA512

    05a61937f00d778dd508285e23c74ac5de626b1192a8f16b45cbc928216ecf9a391ffd232b463f286650bb1b348d44ad1b9f76c8a43c5b0bf851f34a942c68dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95c92cd35a60a8df23818b7fa0812cb1

    SHA1

    48fcb0b8c4642d46f00951d189edaea1be2c64dc

    SHA256

    7666630a4bfda11f6b8d725bd10091357583cd9077f3fb67dcad54e66d20905b

    SHA512

    facb972c96dc3156bdb344d1c5d994a2e07436072a1680781a2a47df966c88818027321abb5ab968640b3ee9df52dd7b3e55a653a0598d2935719cc01bb0ee9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e7c5fdc2598a0de8f27397d704856dc

    SHA1

    b59759dfd5d1795effe752386df33ab9c2e0c60d

    SHA256

    539d2cea1eb514dede75aece62dc8b77bd9ffb8cb45bab2a536d673fabf81849

    SHA512

    b69de4f76fbbd06d2588ec162767abda2f4a34b649aab25e9cd8b2b13cbb1cf2e1458f9484c994e067217d1c5ddf19f52ee29f31260b36dc701745d322539aa2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    595b1b33d60ebeca34af9d7a5116a7b1

    SHA1

    3743f9d480a82d88658d51a968e6469982df55bf

    SHA256

    bb0d626d76105df96c557e0f4b225ca2d817f22a15516edbaea75f2f41e69778

    SHA512

    d0bb4a5c91f4f3e1043460e250551fd6eb60a8c6ef08b2cbb94f86e5f2a7f4ea45a4bb8fe7a2efe9727f9502395cc3e24fd75218415a942f3d9daa3fdac7a176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c27722578edee69aa0c23f65d81f900

    SHA1

    35f4138ec7f8850e1de1b9d8637ac8861cf88b6e

    SHA256

    1c688df9817bf44f0235a9a0ae9a4634446dc8f1988ea144eba8aaafc40a5548

    SHA512

    3dbd158135ea0017ea9851a41bf59d6bfb1b755c38b682fa1ceea03841281a86106464973c208b86cfb8f2cd1b433fb1beab1b23c88ee2db23b9191320263414

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e83091e9ef8a7b8ea88ccff8d08a999

    SHA1

    ffc35ab876865834114baf486e9789c2a38a5119

    SHA256

    9cccf4dfec71c951c11fa237020c12dbb3c0c70c8694a60bb033ae6f8a18c747

    SHA512

    c7f7d99b3a20aa5f086fc8d90b8a9eb94d5e0d16ea2a00ad7466dbfece79b110c5f44214e189e202a3021b64d714b8bcb472bcb576e7503603a82c7044def2e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1a05d5c93cacab396f90bcf03658050

    SHA1

    a9a44a169a8b3f77bebdb82ce48baa6ccc166dbe

    SHA256

    6dbc47c0f0376b365af45233309d6c12604594db32c4122faa240d4e155c5a81

    SHA512

    ec88b7137d975f91704b9090c4b8cdc7de7999a6918104112fd4dfe015c8e3cdca43b237b9fa8cd75780a9db3395929f67adc153631e24561867e4ae81d6778c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c5c194b5b1e450cd006e9a25383828f

    SHA1

    8a4dbaccada2f01131df2c1b324f968ac5abfc08

    SHA256

    d1616d662be622b5a8a4f3dace109fab6bffc65d4b81bbde15484b246be33a71

    SHA512

    85fc81552891d3b18275982e27ac0a43f213a1f78f4a52c3cbfd94dc92554dc0fb745f4b4c56cea186e595278d6ff7704a4d71b92e8040d200339b49d5ff8340

  • C:\Users\Admin\AppData\Local\Temp\Cab98F8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9959.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b