Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 19:30

General

  • Target

    Payload/CapCut.app/pt-BR.lproj/InfoPlist.xml

  • Size

    1KB

  • MD5

    d3f314b1926f882f39696410c07e3759

  • SHA1

    447c9b3822dabc3177f0a285457d9372e84da433

  • SHA256

    f8e5177bf7648b751fe3f94f11e398a682df96fd132f232ebcb3cbb10aa8032d

  • SHA512

    b655fabad3156f1d25181b7fd0d824f22ec3e07be2ec6d192594cc68088ac03866716be17c62e2402dd5b8f527daf6c8968647d10f60832e72ce072b51c47f7e

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\CapCut.app\pt-BR.lproj\InfoPlist.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2148
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    576e6e41320838b130aa347c01962b95

    SHA1

    da1d841f502d7bd0613e6ac799dc9791ae6f2096

    SHA256

    55dbadb64ffbf630284fe53199c929e353b77b65d88c5657ad38d70516a9091c

    SHA512

    bc495e71042d73678e7784dbb0101420cafe0441710798f3092eea9305f6d79bed21a3665928dae191ac6a54427664086369eaf468f78f26e8e35198a44f8080

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0328df07a5633c7f2e1b6d4a51cf7da9

    SHA1

    bf9a1e28f778a02b699dfebc244b6e24d7fd5850

    SHA256

    36dd352047a39ae3c281c181969ca3410469c00a8f57159606f7d37cc0be2653

    SHA512

    c64965feb6023586fa9ab02ff7cea42e4edeb9edbd46bac79a0f2ff960cd53ffb5b8627b2ed0c91d81d43cd3194eaab26109913650331dedb75be0eb100e19a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2dcab5ef793dc4b0557f472069fe5392

    SHA1

    12766b69c2f2f756b8ca45c171fcb0424cf195fe

    SHA256

    9ecc5ba6f42d7fbfa9e82c70e6b08b75282670917d617533d85c0180ac646844

    SHA512

    69106420ed4f8b4142f9e8f828cb8ec0557666a927784ed2f73ad5deb1d82836fb6d80e2d94738d554a6183652d82914db35bf9da3fcb7cc401c0773894fae0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a56a07b2e58e68385edb90174037fb7

    SHA1

    cf5a9c41266f89e018d869191f7fa9e5bc89357e

    SHA256

    95282f4da444763445900152d572b1f8e53216542b94c760e03a2ea4691b8f0b

    SHA512

    b1d4bf216bb90fd01c41fa9fc3337a47d92b0b702a658f939969f013a39d28a5e8516b7af456043315bcc7dc0f96482ccb9f578f0fdc652714212ef65e0bc3e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2663bca89218a70e39e9920a725d7ddc

    SHA1

    f19d43d1e7b3675d3e3f69a064da551acb7c3a41

    SHA256

    334a98968acbc2205382028d1f3db11c40da463abf1033e04451d16757d1fef7

    SHA512

    162dd7566d798bcab8b1f57a0e96a65665100ce795d822babb6951ded2dc289f6f710820bdbb9b804165af4ad3d266e42098f65f97cb240f0891dbeb783daf04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dc95060ced7e0361f16d1e7e6e733a7

    SHA1

    721d1406323ad8d626ca35fa0cb3f27d7ad37e09

    SHA256

    a7b09cc880885d177651eaab178fb281514e747c6aca36ab54185f0752382473

    SHA512

    de5fab70cf86206bf88fdd043abb0f8b2eb0ac8d9b14ac227a3b3cc89d21dcf28f3d51d48d28f954d8f200e9f5135ba903b839259656a0e0af1502ab4904914f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7f11cf8262b52f1828f149acb45114a

    SHA1

    47f6d1bcfd53a04373aa6f20dc781b45073baca0

    SHA256

    3ed1b67f0cb23f929fd48825956a36f237e71f38bcff4d26bf3e025c9bb94f76

    SHA512

    505320c6ee2e9f6f66d43c640d44471dc8eb90be783467cde1e1cf68e55b386054f51e884477be451660a17931accfacf21272f0fb114107cf02213e6ba13a04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8abd01669b3079b5367a3d45f2e49431

    SHA1

    a5a5fcff6693c269e74447f38b28dcb358799078

    SHA256

    20a3c302da036d6cfa6e2c983b8c89cc9fbefdf1e3e891af94a3ce72deb55bd6

    SHA512

    21107c60a9ee393d7fe22a54d8fbc75d3a7ebee8c5874563a0d4260a8c01dde89264494b33dc42b65028dbd2e756b018711436322683fb7be755d463e7f4d8ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    020856981d864b8e74bd719c3f70ca93

    SHA1

    2c943345d598785df293c57b29629abb3dfa0bae

    SHA256

    d588e9c79126a4a0e5523014e57b28e69f06a54a96ae0bf29b05b582abf2dee3

    SHA512

    f4a6ae85592cb923e48b8490c3f31ca906cfb8a59bacd87141cb039648486504b12d8db26aed6d2bf2c4489544aa83eca47f8512a38ad7d021a5c42f547dbf30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfe69d3ff6790c9b9b10a39b36d4d1e3

    SHA1

    661ba8856194673781d31c0fecb1d1750a3163c1

    SHA256

    48345c14ebc0c7336a41a9a4f5780672da7cd85ea675baf49578be88b15e92c6

    SHA512

    d4d5ba95270ee2fe0dfc89418f7299f3eeec81dbe54da5b260dc164113fb51aaf034b9cccc0fb7b85d1b76b11e44c8fb51180c57aac89a8914af8408f54c0f41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26a6dae5b4c2aa3a10dded211d3f9ef8

    SHA1

    48e2cecb889dea39c9d3434f15440903ca7b462a

    SHA256

    9d441788b114d325992bb897e4b143a749a1b00ed43d3dfb57a3736467b8121d

    SHA512

    fc76d539daf573a56b1255d638e23bd9a48afde6025547485ebe6ee0b8e9a305e78ea55595d6ccfb3fca7441d13a763ccc68e0ef6bb7d19f003bba14f706c61e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4c666567604ac88f90f9b68eda023a8

    SHA1

    7722e9ddcedc28c8d31884219b832322ecd4c7ac

    SHA256

    d40e24b6e53fdc7414743899d3a4bd086b9304e794593a28dd2b5b52bdafd9a3

    SHA512

    9d87496c95020f9f0148bee35917f7cfd6b8d713d75a8789273c341eab74a89445fb795f3bdc1f09ebbd3fd24f7c2399b284f1eacf0a1fa180da72eadcbe10f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e055f90cb1254a5feaa435f6d077351e

    SHA1

    848eb59bfd90633001b0ead548fc0eb89b56bcad

    SHA256

    82a8a2b2825f193778f472d714235ecbd23f878010040c1360ad43d6f0e012e8

    SHA512

    285a8dd1726cbf68c275cb28fb5c70dad744831ba19bc9ebbe9234aad7fb19c846f9123178b01c3ec4964fa47efa99b09cd7bea7df787de192e94a3ce0363192

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7e4333c3dcc61cf3b910f849d79de15

    SHA1

    ddcbbaeca6456de519194d295d37bbc02766bc08

    SHA256

    c8adbcf26cc4e4cbaa215995a41e6289632852b44978840898ff660c41b2d41b

    SHA512

    cd5e6a664a37e26b8c473ecce6a07b20625d8c7fb510a8a9a1e6429bc25054d035af5ea3a726290aa04ff24426e878c2cd06545afea86e9ac259edd181a71219

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e57fabd1c315346b948796dc2501d68

    SHA1

    3f32aa26d6c32770fa5c2e06264aa5bb97b1edcb

    SHA256

    2e3ba69d81250a63509f54e576192cb19dc4c94baa17e513916d1b0089711d06

    SHA512

    7d12e8e9f2623b590902039ea3f097efe0b5a36ab051d1e5293b12030429040a51662f5a7bd162b2e5fe837fe9652858d1ebb6a31fd3cc1dbc42d9805b9ece71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c98087e61d4b3b42fa9be05df5af1caa

    SHA1

    cb43f0aaa213f20e528d67f3ad70158ff8529ebf

    SHA256

    f90659d6d016179bbd39d1280d8eb25cd6d2e925f968332cff22173535e187b9

    SHA512

    4a8e51fb45cc326c968940dcbe3d18df1b04d056658bfa492e022eb0b69adca50914e90991e87721d33890d2d0e924541fc30d7fe89d950d27d7b27cd74e24e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e49898f6fdf689b1d3468ddbbde0ba2

    SHA1

    6e92588ae9c172cd193b307e11e23e2fdb5095ae

    SHA256

    6a7b1a6dae251f828db87aa4438442003714bb0348b788a414c973529c2d4293

    SHA512

    27a52b5d8008ddd0f22be43f03fc14898dca2b5314a60e8278993fc4b8f80e073bdd298412c6fbf6603b544daa67f4a0dbbfd01299bde942b80b3164d5790228

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f957d118c1eebb03002ff51e70bd0d4a

    SHA1

    d451d3b0c7a646e056c91cbfb37ca3b3602bd435

    SHA256

    42ed92e6f97f7d5a152206dfa44868870b1b9d6abf6608013e07c1fac868016b

    SHA512

    0d2742026b13c07ca5751304e2872ba6d06a688fabc1140bc58a5a0a713bc958748aa2afb6323703080e56117456e62c7902dfab938d7c90d8eae035bb5a8332

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25c0ab1866d0cd977744b3d7d17098d1

    SHA1

    cd82133db8dcc0243790679798b8ce4d4931a7c6

    SHA256

    becbd911a5cd3a7741b9c3a476a4033a0b123578bbdd6556685b653368a22406

    SHA512

    f9bf0bc30651c801dd7347370b33c1b880552c1cb66bed148d25a856b6aceb88015f5de75a20cb1b9d5fcdc49244d947a9a42b109ba14e5237f1d685f4bdad52

  • C:\Users\Admin\AppData\Local\Temp\Cab43A6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4466.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b