Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 19:30

General

  • Target

    Payload/CapCut.app/ru.lproj/InfoPlist.xml

  • Size

    2KB

  • MD5

    d40c63e1b3198bb15f19da5077f155fe

  • SHA1

    5a8afd83ca26d35318a32a4362c0801e26791e08

  • SHA256

    b5452aa57d2043e810c38fb09ae086dcf4de3c8a31f77ca8ca175901f642fd57

  • SHA512

    0d37b1387010481b62f45775f79c58cf26aa5d24439a07fc02b36a38b41fa6d3e61b57a77aa43016dddc2c423cc4362334597337c278904352c3ff8128585af7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Payload\CapCut.app\ru.lproj\InfoPlist.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5788434dfc90d3daef8d4600f3a4799

    SHA1

    3e15dabad5a1dab5c11872e1af463b19636e2f2b

    SHA256

    8881b6ffa63210d979b814a7d156cef9b3463a51504710838497a37ea0748e69

    SHA512

    6c6d7c99cf9ae25cac972585e89f1575170cb26171a8267587120a69f1d3e5f1f20d5def5586e0950470f0716d9e2b4f5b1928a0f91fe7b55a3659aefd83daa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56ddfb5eb494d084a01e74c246d6fbc1

    SHA1

    9c7b8f623dde09a9984526d91808844f24cf6337

    SHA256

    20e0458adbab1ed9c3828639e9ce90457b931ee23d89989b0bcaafb3653143df

    SHA512

    3d01ae9072a232e3797904e9931f86c637bd7fb1b1dc98c32b7a841c24d13767de8c75f6d24781186694ef877332f85104df04fd69db8fef94377bd85364a60e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46cc2197a911685cfda3c31b33ba05bd

    SHA1

    734a728669d91b3cc9b06c6d033ea7523bece701

    SHA256

    90d4a604b77e95ded79a95fa1bd517ae44d93f88d4cd60d5986e92ff3c26e3f6

    SHA512

    ac0e274fdb997b11cf615e5a6df7ba06b168e66c75c1796878610e7a27b682fba17f26e292027aba101947e3b86a0ea86d7dc704b24983d7179f07c6dcc957a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    110ee9d4162260c692406995381cf5db

    SHA1

    5f91edf9de700bd594f9be6293a9ed9e01fe1bf2

    SHA256

    9bfb6eb4fc112bce84f20e50246f4e42f58c39921293133be7b108688419019a

    SHA512

    78889fdd000ad1fc09402335fb1404d76df4a3191c67bb50b1a4164da0d5130b6132a978f9079ddbaf8ae1f7a84635cbd3fb3319c679b6a49713bcb8019e0763

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f2fa03ec795943475d70b695f36e46d

    SHA1

    f094bc5f58c7de7a77f23d127b85ac73003c2548

    SHA256

    d351335466ad3f3ae4e90e171ecbeddbf628cfc00feb1b65bb8cd5c62b2c4806

    SHA512

    d978e4ff5f65d6938bf1606d1b618731a38fa4822b776f07da61b1fc784956b30ad0b2f1a4e48c300e091ab6f4fa724dd7e11b8c8323cc93a8b032cc4fd9effb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    984ef40615adcf77c76eaeb5fbb4c3bb

    SHA1

    0930ec01b70666ad27c717d7ae44c335e8bc703b

    SHA256

    0fb3d63d52ab6be011b4d233be4efb47f617633a39163bd4dc0217ce5ddde9b7

    SHA512

    2b4bb8b1b616ca717fc3562704509fd8c5ec013dff48abcfd54faa9c0843b8bb796a2124925908392bb98c91ec576b3e00a6d6a2bb9bcc7637184e86687e0d2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a8836c4a30178aebd85b97790e79310

    SHA1

    320aaa105d7b2985db52d238300566943eacd43b

    SHA256

    75c35473ecf311ca0b920d30f3b88958cba0fa9a139ce204bcd44e3b4706bfa8

    SHA512

    a369ba5c6f28210e61dd9e0db763be77ff80b528f82293d34428000b41a581750df6472169593451ac773508901a951a751da357b8ca6e3bea0fae50530cb9c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2438fe89d0ec84c7a16feabd74c4033

    SHA1

    bacc0538da3ac33052e6bd61ba802ac1141e18e6

    SHA256

    6fdc22ec683418f4aec728b4e9d46cf2d1d10a72535d656d82903a20c9f58805

    SHA512

    85be50544ca0349946c9849992cef5f5f77715b8eef47962dccd248283c534a5b912168ece742950ef332c3eab50b71a2c64a82371dfcce1e82712540bc772d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb4a77f1955e16a31ab4a3d7471fea71

    SHA1

    021910051cbe9489008f2cd08a0f76ba11ce9137

    SHA256

    0ed58355efd82447c3a0ede880f6f030e07a3dc2503f6f34ee3b331082480517

    SHA512

    3e4e2938723fa4fc4588b9e638bd4419ed1f893f91b32b058c99f23bc08c6f824e9877394fe6bf90ce0a2cd99986cc65611b25554ba1817311cb22625bb117f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9af2273526d92a398d0fdeea7db0236

    SHA1

    39e9a91b24ea15870ea1143665a0a233ed7286db

    SHA256

    98a49912b0f2e4e43a2c00aa8b20ec59788b067ee2eb6c26b490f07edda411ba

    SHA512

    bf3ac7d3611532915d799eed633a4d3452c87cad658a66e5809b6202bccacd41bc1600a864720d4347504bf10a06133aecca12bb276e25d8e6158c8c45179d42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8cbb03edba46f4f8b960d13d3ddb521

    SHA1

    f9b5b818c9b5f14ab94f16a2416dae2844218c5c

    SHA256

    144757aef9b91c48ffaa482b5adc65ddf31a39ecf935a6a7753f0f0934975a6e

    SHA512

    702872e71bf43f8dadd81f9897e99801790e296f1c36a3d40ce9d7529b22856192709ddd83e89bd24616044f607dd97cba53a12d634866724b67cb8c6e623125

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2c1d744b21733c19a2675e1f17edd2a

    SHA1

    c3b0f687c0ff7736064e1f4d6dfe9ce5c1977c3f

    SHA256

    d2438df3d0d828098c8fcb2382c0dae86aee6712c6b360bf4b0022cf2dc57cc1

    SHA512

    a4b763772ac4294cb495ba0e94aad647893f976fcc9b28c91c55a1f79722017d3431002e44e48b255c7ffd3c241ff286d49bc16d17a9b69f518d56dd380507c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8bf7473e350491cf704f562579ed97c

    SHA1

    d3cee81b330a27f82f11cc3103ef31da9f5f31a5

    SHA256

    b1907e56073c2932148305f75125a44f8d47c8ae4e6c2e4e31c2bc975e8cb8d3

    SHA512

    9f7bbb3e97d22d1276a5fe7c6cd8e8b77f51547e660959a7c9148171da059bc6e67f61717dbfea56c226963367180fe15dcc094a55e30620e184a1e6be75004a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80b45e3919e4593250ce931972dd91e6

    SHA1

    b9d60e3e7464ef691abf1afa87734ef59686e8b8

    SHA256

    e4f2ff15f38e63059c0880aa69cf446b2b898059bf49bd1f82857df7a1877fab

    SHA512

    c21a5fbf2fdbc62d8210915d7ea88648eabbd4c995c30c2433df1008974fcf9cc9b58bb62194404b7d0f8a45babe9baacb8d55a9ebf3c03e4fa0a367a3c92ac8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e8b0e8f53f0d15238d5fa7f4676faf2

    SHA1

    b9b51dc1912301ec8af58a9512253a354c53db2e

    SHA256

    7bea9499c1b34a3265723d9649180bde0a8d7c729c8a844c931dbb65ecab1e79

    SHA512

    8f7b26115f1dedf0f9748ae32d987b75d208f87c78801d95469fe7fcfc248447cb0fc0c98d925d2fa52eaca8c965b91f61be59e60ff4888f92530aedf565f9f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c36744d991162bba65fa1d499116438d

    SHA1

    7957a1dbf3749723f7c2ca6991030637f7c74311

    SHA256

    88456123e7b2f9085dc4576d9736ff9fd7b16fbf3eaadb64b0107d9cbc7f59d8

    SHA512

    47227e68654cfa59df73964ef744dc35212ac1d211866831522d31eebaa6ef188913fccfb9f06cacffd103ce6628284ad01a58140f6e7df22887b19d0788e944

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65b0e50d8f2b8101fd5d9cdade3f89ac

    SHA1

    424f5a395807cf79bbe26069e0898fc9f87c2c5e

    SHA256

    0a5cdf11efd6dc63810650c82884149d64d259f4480fcf5eae0668f1c8f042c5

    SHA512

    8d6ce04120d2242b02a73f3e5e06959b9e6dd363e0066586ae1589855a6892e41d5fa534adcc4f0c4ce1bebac02b121b48078c8426e5ef3f646a391ac3565e34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48560121e9aa7f39ced549d630fcac4f

    SHA1

    b9dc16618b674d611cdab791df96595af528a055

    SHA256

    2dc28789ba2087396f31b32bb54c6b56ce64acfa6df4bb905370a8319dfbf711

    SHA512

    757504f226303a98393cf3f85beb2d4085b1677968164b95021cd0e09ea6c7b6691d79ac89642c0d53d56591aa08babe2997e1d2e1f85b0910acff3c9337cab5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    149ef9c9024688fd6e4371c59de9942f

    SHA1

    ad3dea7d7ce377795e6a950248f02b2c6ad303be

    SHA256

    c86b854689dafb62c41564482e57d47c63c08da30f391fac94bb1ef2c9144c29

    SHA512

    b8a7639c0d0e38c37eb2840ae1405a86d3f60413288dac3ed862978caca8357282097027f5c88d369ba58b8bb2c7a51055cdd0b6be11e3033fa151cb50bdf5eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ab65be2a90fc44268443c22ba7beb27

    SHA1

    e1d7992c39d880f78979a68daedcb5e9da6e930a

    SHA256

    ce7291e5028fd4949b617d1558339772576522d0f1822b108d5ac42ce9d826f0

    SHA512

    a975b11893e04e7341632cfcce9ead804df40f80c41011f72e6008bed759a13270a1937fb078aafbfd51bfc37f0778e7837fe5409517672adc0e7f99cec8237e

  • C:\Users\Admin\AppData\Local\Temp\Cab83F1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8462.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b