Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 19:30

General

  • Target

    Payload/CapCut.app/pl.lproj/InfoPlist.xml

  • Size

    1KB

  • MD5

    148ba997b776f9d3be8f9785f1407672

  • SHA1

    59f1bfc08740d78caaafe5fcadc7ecd0f26cbbeb

  • SHA256

    9b96df2fe3fc8fc6db5e2822d6133834f3eaf541ca1e3a91587b63f67f1f748d

  • SHA512

    ec98922994ac5bed2c4276c292dfc871629da6ef1c2fc0f43142a7a49ea42cde98d8249ffb2d363e3224c6a90a33e9ae382b0652f895227172d86c2851830b5f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\CapCut.app\pl.lproj\InfoPlist.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2280
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56ca4daa46962893786c4f5e3d904240

    SHA1

    d8500c4ad52c68081e42d34387a8b42e76de1bef

    SHA256

    2bc5ff22532ff30f08067de18901c8df52c9132a846577c5be6f87ed5683ca9b

    SHA512

    b4fa9c7c698f581cc4863d06bf1968e172f172f61d8ef01140782190eb45d9a85432ee2624b7655af2dc28e9faf6d8e15608373a978777eb1e3f795ad2a40c22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f60b433c5184b9c8087d6ee4453310bf

    SHA1

    fd56ff90cb69c7a0be49ea806b0219a69162ea88

    SHA256

    5ac8425a2ff5a46a34eb737dbe99e2c3b7af4b6d784a65f50d8a59bbcafed637

    SHA512

    fd70bb7c5e37636ba7e54ba533e8446a814b2e3a60645bc14f15ad6ce1f95d94845932f096e4a9356c0ffc992045d7ab2e20da7a2598813284cebf442efae712

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87d07444d458663fa2c40bc7919d2184

    SHA1

    b12e10c04a2e29104d50d86145bc7a5563656387

    SHA256

    d697d2fd4894ad47d82fca43ab121bb6b6698cc471d4bd95dd93ebc10c9766bf

    SHA512

    2a20902ffb3e3e4de25bb4c251e2ce4e46d4bb05a4f4a6de9a202b950d9aa6db621cfd4575af0e8cbb89989f57815db6f78b8c81d867e49ffe80dbebeb8eb8e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b195f8cd205a9ab5b74f00ee0003e48e

    SHA1

    6209aa4ddd17ca03c2c2b5ef70d6d236149d1413

    SHA256

    e31252d300e303ab181b7a7dc02326c4dc30caef4cc9379af63f2bc78d2891fc

    SHA512

    f10b9467bd5fc554f186ebf72bf86814aaf418031500345d8ee266a2d7a1409e616d774a14316ba45b2b19d09be0e051724bacdc7ba52a300dd25172d2ece20e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74c7cec97dd000ffc6b8f693dacf7154

    SHA1

    3e4726d54ef4b1fe007aa2691214bd7467e683de

    SHA256

    1e1ec0a667cbe5868f3c8b978ae8a800f2a47693663b092e04a7884bfc213055

    SHA512

    d8566ffe4a625fb4cae2498dbcd92eb0046c81d33018dc9e6533acc303619d7155829087d25e1ece43ac57b8a571d8fc03407630843dc2b3440a0e4a594d151f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3caf3ed603affbe504b7df7b774c60a

    SHA1

    606f016edd9fb652c439d965a26ce7a1278bcc54

    SHA256

    5562e6649c99f8cd18a2925703d04215a685d6698c11e1764436ed681e608c4f

    SHA512

    e41ae1ffb884fd6f8f50e9ddfa369e299b6eea0a96b9a4e528a2670bffc9f3ffe83fe4ef6d6ea979a1fa3d2563fa9f756b3abdf9a14f35caf7e02b508f099393

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3984437d792e27a827bf6321b1b82c7

    SHA1

    b5eb9a812a4b2d07a397ed35135a34b6ee956d7f

    SHA256

    fce5c9fe5325316255860f1e395d70c510147eb52e00a152b6128626cbd243ed

    SHA512

    a7a25a8f6d623de2019260df62618bb8792deb5bbc9b0ba9b56b105e692d71f1f10649c71a72c1f563f7635249fde1cef715aa881335f9e9309dda8516f1510a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1f9a6306e99a2eaf5e8f4ae991b5493

    SHA1

    3432f0921fc15c9c6f812a440d35e2a2e7aa88ef

    SHA256

    0c72fab61b6247066a1204fb3a66e38b9cb05b8fdece8cf1d5869d1b37c3ccde

    SHA512

    ca714cf802e154d35cac3cec69bf3762e42f21a652ffa3dc9dcd564432092fc1258cc7f4306031fff7ed72ef43167cea34d0d7db44bd1517fe38e0ab011d8d40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    daf8673b14e9a4e759a6af62dee8c65a

    SHA1

    c9d665635a4bcd166f67c19c874e935733ba0e71

    SHA256

    4f8545908d9773e62bfcf27b379ad27b5e52852124ffddab65624208b1a29357

    SHA512

    b4f70fa99dddf786583743a066fc0aade6eef7d4a0d2c885a408447fcbecb810ab840d581c048070931f086c68a0f4266eebe49a05971c4b453e9c4ff3d01d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6668358a9f74fef72bc88a8cd85d4d0

    SHA1

    7c355e852f8baabc8a978e74e43be7a2d0b50258

    SHA256

    e43c8b2c32019bd90c7c7a47e1bca071b25f7e58de14a888f662b16691ca9d9e

    SHA512

    55563eea7dd208321a0810f9040ba34b5400c6e79e78b45b735d1aed3ca7fbb8592c3dac0969c321701f51f7b6c12f062cedbb653a12070cdca3981d7798158f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93b6f7ea55d6345eae91e28eae946de7

    SHA1

    f09e41810b943fb229af7b2a57c1a23af0b8d6b0

    SHA256

    38695d39b9bd7bf1eff1ff386ddd23edc3f5f79f5bb18b2863f453f75cffec46

    SHA512

    562097d4b7c38e62695230441d574cd4acb874176aa3aa134207c8a8c842108a88ab219be9f47262edb8b25c5ae303e5c161779c6fb240a719de21118c1ac0a8

  • C:\Users\Admin\AppData\Local\Temp\CabC96A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC9F9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b