Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2024, 14:42

General

  • Target

    Microsoft.Web.WebView2.Core.xml

  • Size

    611KB

  • MD5

    6c5c5290bdd2d4072d64a3f8aac6d02e

  • SHA1

    a610567951bf885e11ee5dabfd87dd1d37e4f50d

  • SHA256

    1cf4f0c0994cdb65fac609dd19755541ae109d917695dfca9c4acae08ebb850e

  • SHA512

    a77ad02fe706227712c231e7ccae084f8d74bfa490c8879117109746c3cb3bf77feb818e0de03880e03b46d22ad1b8cadd9f14fe2e69b34bc2770632a2311a48

  • SSDEEP

    12288:rV/cM0fctDZuwKxzdpeqKgan2xqfcan2NPPVeLoBWkO4am+7RufDufBSCspK2sSl:4pBYvfVO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Microsoft.Web.WebView2.Core.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bf8a592e69a594b9370217a81ee712d

    SHA1

    3e8051a423e53e29a9b583ef42a3ce3c3a6006ab

    SHA256

    1dd0cc1f51d25738717f436487c75529f3ae04403757d3a95d72adc732a4c216

    SHA512

    914ef4f8de81a22855934d28158077c7559b044930752c7a74344b07b58431d85dac9f48b51973ab3a74c2ca54a8cc345e29044c18ddf75cccfd4144ca3c39f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ef2d63bd72ccc9b86fe38910c9cb401

    SHA1

    2816a55326e19842568585274af112dbcb9255ab

    SHA256

    b6a2210bd75e3bf805b625e25707ffade5a91a46cd97e40b6687f73603b9e2b3

    SHA512

    8b5a57e8a3538a6cc440c73e1dfd297891dcbce57c656eecf34c1d714e6dea7deb69600492bffa9b907a661b76253f0c94383ad9e86eca63cf11dc67824c1d4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa238e7aa22b984a3e5276f3f3fc430d

    SHA1

    f466c5c15659f7a70c96cb132ca510b932f82d95

    SHA256

    f59b0c9b7c069badfcc8695d7e8cbc4947e97d21209f5cc4a864e4cb924583fe

    SHA512

    f4f0b65e7ec8a024692faeafbf37ec14d75eabb1a7fcaa7486358ef48455b6370c99e3d20c9f3e1002d2b9be50858eeb2c0fd384c01d7d4560c8b11b8b4b0b59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b96f7cee189104294265a0291a85b76d

    SHA1

    6ee8a69958acb6fee5eda5cc0a3edc5170ba24ea

    SHA256

    7526d8c6fa6ab91db3641276a41c7c924521ebc083371104935ffe524b077d9a

    SHA512

    7ec1616e80c68a76ccf7b308ad7af99e0d87a705ecc812e8dd402b588ef6ad2bbd7a5170e13f3871123b7ec6c54d95ca8b22c70c80f51f02fe1a4456aea9997c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b719baac17d9a709a47d5ddf8b25dcf6

    SHA1

    c153a0c093eb48c61eed39e9a708428a6af8d00e

    SHA256

    f0c5a16db7ebd2458c14b3326175af097d2665c3502e014c5c5b8ef081a7bb30

    SHA512

    19f4c88b172c2b7f4095beea0b58167c51f04aaa71475afce18017650146143e84def4c00668616cc9fea26e02eade5c620e4dcc7fdcaed83d7320a2276da63c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e21658b49439daa945a3612fb501a225

    SHA1

    e8c2a3d131bd915383a0d2f5fc513627a2a39d5a

    SHA256

    10659db2ad6611752bb91cae22e1ec686be7497ab0d5a00dbf43f24c7481fc71

    SHA512

    3204542746075582217bad1306296e40b2da9925e56a4205391903e82f678b18ec116d2f2f01a83cd5f0900e9c3ebd4f6a1b82aacf8a5ed45865a054ad997887

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94ae01efe65e74f6f4e6aa4cd8e78ef0

    SHA1

    a5e94c572a8de8bf01c34fc2cdcc52e8446ecac2

    SHA256

    f70803a3c873766697349e5c1ec0ea29666798c6f750492e28d2873bd305fd71

    SHA512

    49b7fdc7f6626a79c59774c0c7c0362e5a9feae3bf5585bd49166df93584ebe1c8a63008238be136aeeb1191830ef10c50c2cbcf721773dfe809bfd0dc7ea938

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cff726850004a03f11ac9517a272d3e6

    SHA1

    f748949e01a6d2d1b1192b8e63548904e2d68fdf

    SHA256

    d5794d091222526ae160c0288c70c29010b16a98b764348d194ce23215114a2f

    SHA512

    8ad9ceb224b81a90fd67385719ca4581c9041532e7237430ea60ffb07adbcd7d4b8054dbf81313566de999d5b3c1943166d5e347fa8e86b7070aaaba44be1b38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    609cb33f791040c53e84f18db1daae33

    SHA1

    03ea93e1c3f071856f5477ea2218b6dab7d2149b

    SHA256

    15f735746605d144bad3916432d2722ed6a0abb110039fe7b998c2a8dfd66caf

    SHA512

    5dac9bf8fce5c516af31572c0750202375b0237092e0e77008f0e92b187129dc42a2af7f52954f1cf4db699a2c5302e895be0e87dbb65f831a98810041e2aa50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    979d76772c46e09be98961074c3ca3ae

    SHA1

    d9974af778daffb59f2c1d3312c169a7e048f958

    SHA256

    6c0775c70ba00564e6fb773b33a211346d91be86be502f26416302e9985fe6d5

    SHA512

    469378ba9841704c9302bde2599545ae161fe85ca03019e4c1a25a528cb6a211674d952cc1e4581a0327768a40d866e1acfd24f08e506976a8532db537650393

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9070d7648ea79e3dfdcc407574df057f

    SHA1

    0ca3b2757722a88a5572dededc7a2e59d30f6b69

    SHA256

    98aa49944726566f94fcb83510d73118a423210bccfff488d8bf9bd61d7d667f

    SHA512

    0cc2e72c3fd8a84dc44679bf124aa90c9969eb57c0cb3b7b45d24c8a12775fbb1a08d130f633cc8f44eb96e4a5bd4c6f24d6545b471c80edbcba863992b31ad2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    192454722a5650c30804804e1dc11846

    SHA1

    68f2660d4761d2eeb825b8d37ae550fd7f384d43

    SHA256

    77aca61d0b62e6beeb01e779f43a65fa310e7e8f55e8b720203d35d1c467eab3

    SHA512

    236a78a34efa5431628ee332dbadf93b2c952bb0d66b888749d14f85cb664c48f8bfc34708ad7739f3d2f21b76b961cf52b439d038b25c7eabbce83e700442f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cface147f96d524dc351569657021f83

    SHA1

    1161ae5526753188d3b834145e8e38aa454c4728

    SHA256

    5dfdcd8f7883d8bea68ec7798a2a26c4b0114e0f45d64063b22acf39cf363dcf

    SHA512

    7f247dda577d956ca0181c27415386079a83904c8820e26b78e767ff211f38f59ab3cd3b9d2c08bb2028a9f25798fb30151436ad97b4a134d7bf78f55aee97fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f1c4a72be01f5305550987e10a4615b

    SHA1

    cd135de129caa56b76b5192f96f7924ae294c50f

    SHA256

    4fd72236054aa884dfcd36a8c7ecf06368929e2dbb12983bc42b3b722c6164ec

    SHA512

    71509f8fea82705fdaadff3c2c7ffbaccfc6ee8604b0d2f1109f3e7a9ef7cb84e257a7f29c4a133840e1190f04d3fae11e77bd67679f3035159aeac41f3a6e14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d91b25fdadba5ea15a533e3f11d57d64

    SHA1

    253f226a7477eb7c8df01ff9e24f46ee9efe3ceb

    SHA256

    6abbe632978155d6a2fb5d0002f0037483e72b1e3132c95dbffdb758d8c28c34

    SHA512

    934c81bc538820737519101734e090a4f3885a75194b786d920372a95c6fbbf53017b52a8753dc563a8401c36ff2a4be15275c17d9d54c6a4005b2f9e5b47ee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a977ded4d692797d2823d66ae048b77

    SHA1

    03101b6ea3c771b211250e9ad48d2ef6894a4572

    SHA256

    e391619f3d030be3d75d1b9a7c5fde3fc965311a1ce7aef2b77574618cb3c431

    SHA512

    56a81029a668d092bdcdc2212049853ac46fd652af8f322152923af697ea35b0b9857c1eabf0d448bf805c3b72df4e539b44b34ce4056f9fcbaa2670c728d187

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3585f2b912b120bba5cf2823a99388d4

    SHA1

    e735cbaa6c3185cc44cbaab68e52316cd415f330

    SHA256

    2ee7cf654571d2e8d03fd619bd87a3d22b76d8b9ca89d7a58ab6e84d71bd5dea

    SHA512

    36151353a08f7f0feab0423f0d702882ff905707939d7c4a03ac6192eb6236c7b7f8ca04bf2432153deaf2ebc408de74d51ba127faf7d75cb328ba176de3cc29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    177d666fb139b94aa7bbd6fb253fc2ce

    SHA1

    407db17876ee41b6dc728fa235fcace209d5500e

    SHA256

    7ba49c20b3a30d15f4d1bb30ca7dcb275563d88fb8d647a1b8001c99bdd0ca8c

    SHA512

    5bf1fd0ec29afa16375701631d3f82e9fff861eeffbf2082a7581faa80f6043fcdc4d24f35ae80ab9f48c8c88679ef11a8f8ab229d502e66bdc5248cd59e0a95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b808c4a6dca8a15b91315de31700c67

    SHA1

    71403f4b8d74bf46e69945cbbbb1e77ef0e19ddd

    SHA256

    c4a90c5a1d9f920288b866dd44be8a09c695deca8e7319565bb2baf2207164b4

    SHA512

    a536149a9e38a9ab5db8206fce261109e516e4837fb25aa9f5f922bf29df8e2b179173676afc7ba5c20c2209547fac999aa35a725722bc409aaec7a4b3b1f129

  • C:\Users\Admin\AppData\Local\Temp\CabE6BA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE788.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b