Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    70s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 11:07

General

  • Target

    SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Settings/2021-27-9--17-12-59.html

  • Size

    5KB

  • MD5

    c8c8fcd405c8a96e90410aa1db93cffa

  • SHA1

    4f10edb9c46052cf4f8561fae3f39c2280db10de

  • SHA256

    2e019c102d5f2eaf9a3ab532422428e3a281fba275151910f731e21d87995a62

  • SHA512

    fe51e7bfb9ce47762eb6a1cfdbc13578dadcc5b1364c740ef93be76d1958a42768e1590a97fb4514d5242d2c8a136b9561ffeec09e1241b007575527b4940c3f

  • SSDEEP

    48:yfUpWR3WhAx1FYVFdFqxyyTaqgD6FT1hg7tT/fd1/ha1B5dNM121H7/B9sWVYP0W:qD3FAwO96Fuf6/HWP5RhYefd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SpyNote_v6.4\Resources\Clients\Vicitim_354051091211537\Settings\2021-27-9--17-12-59.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67e541590e46477ae42647f5bd7b87da

    SHA1

    c70f4c1065e2d1ee18559e528e8ada6dab240d29

    SHA256

    272544b83eba740da978869c5507be7687b8a298458ced4f3719a7e666e3e02b

    SHA512

    752a0f6e892995517ba3ce87a8fd840278554de4e33b8ba62a5aac86838e293fd833643d0f0b572a66fbc77e8aca4c978fd85c1a05f42e39a612e0f29a0fb58f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b77cd6a15ff5130ffbc45c1adee09b90

    SHA1

    35caaab6752d59dce7b079c80baadafd3abf19ba

    SHA256

    5941e080b1460f4a7a153648c13efaa4c1baca4eba8360c2fff2b8de095ac244

    SHA512

    9b3bc164c4b0f2afc819a56dd0ab96e018fb8984e52712f0346b7d914a4183f7eb123dba1448fa0cf31f11e492e29d6082e19c1d511d7574672940d937e72eee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e3b903d3a1f1200d5b818d7a3435b83

    SHA1

    4a2bb15d03630b4b96943dc497bd351b12008165

    SHA256

    8286163806d4a8bc1432bd664438d2258821b46e1c2171f7e06457f137d7b648

    SHA512

    133604d48fb33da31744fa36ac89ad0a13e02224a6857a337371be6be7f451499723446ec8aa90feb14ad88ef90a44a90e97208d5e892c8826d77d02bf0f4063

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92c53df63371e08f0a2d190c5765069f

    SHA1

    1d1fc31d99bb22fb0a8c331818dab8a0eb0c5cc5

    SHA256

    d499fc862cf9350010a8d0657251802b551991c298f7ab8bf566ac1ed6593ac7

    SHA512

    095e200cd193ab2c9e4c5b0e6fdd007160167b5d1434ed1a1b79c3050d1abb29a28f805a0a478620f24739d3f73ac3c615fb3330ffcd492c91bb5e46ad3496ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ee70bca156b23ab75dbc49b0e9bafd7

    SHA1

    86070cf0fb6fe7c563918b2abb1818110a66adee

    SHA256

    a10b7edb31b065ec1683d96b4bb41aed82881fd17e404e27f7f02369335c791d

    SHA512

    a40cf61ad6fde8c2b0897af5fb531161f3dc9a09f6dfe723e9427627569fe68d3471e5fa1e7499eedbf50e045c2b12a59b29551401084748c748f4099e621630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39a3aefb1979aeed1560d93211969f61

    SHA1

    2f9125e6bcbc9424880267c8768f5d0409f29c34

    SHA256

    55de18b9e5a89201816d6af9165a0374169beec66e8cecc34d1de073e7a8b6a9

    SHA512

    dcbbc51cd4f160cfc5a604d83c298a373cb8f45b01aa329b71468a6d615b48ad122e313dac655da2450d68558c551da70fff71c1c6c2453021f37838209ad99b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19e746ecf891d6f49cea4189a5cdbc6a

    SHA1

    36552ded6f4900dd0e20d33d700405d572d88efb

    SHA256

    49f684694977f32fdc09352b5b22a8e5cd5e2e933b040c1697782bfb8ff81948

    SHA512

    a0f084a60102aebe574ae9565cbb515d013b12c4318e7555cc2042946988a3218d50a58eba5ede9c219c1f7505f4b98e6c7e8523214a98f99ad5c6922920e725

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e73fcc90c4a16a6123d853f40241b95a

    SHA1

    bdb57d34b10365712826cb63a0c4b234748d2b60

    SHA256

    31b72513986f6f41aac4b3dedef9cb2661c950c38bc2cdb1bbb8957f8dd9bd8e

    SHA512

    5eae9f12c2f2ae6d2f52f6fbfb7b05c4a03d0dc3f7ad50b6b614730262694066ce6c13a37a5f3d39d602003c2b5df52975b7eaaf4e98472f1871c31240a02d25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56f89b48f8561979cddeb8d84f3b078d

    SHA1

    02907a4c2ddec2b635c521d19b3051c1c81a1199

    SHA256

    18d56ec96c6897274c20eeb162014282bc23f97bc2f8e3c3e14dac0cc53a61e4

    SHA512

    9d880f1cab2b8a91bc55726307abf42067f96379d5901bf27de07038c6d850c7ee66c2925fcaf366c554aa2fd1bfad37c03a7d776412ba2ec9b0e2ad048e62fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c279228e673aeefab7ffa4027dbe61b4

    SHA1

    7134b64b07b9649f2232a9076f0e15dc990dc959

    SHA256

    6b8bc73c709eb1af096222e12d1ec9ae8652d84848bd870683fc298009e7f1b6

    SHA512

    a70106e44296aaebdd4b6b304aa8b6a2157d1fda036648fbeee98992d86b3989451043f7c6aacda218aab354c24303e4d908cf0a679f01959e366ed2f70420f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9121d7537caada1c6a33bd46320446a

    SHA1

    55fb6ccefeb4bf02ffe7a13988a935c45e9d7867

    SHA256

    ee8a5370c315d7dc23c845c080a997dd3b2dc3232ce1ff7571d80d123bc2ab53

    SHA512

    24a63824ba331e573dcca84ab3313f11a5cec86322294bbf44cdc7d6cb85e3c9577e7b3786da182a4e55ec7686045d4199ddda062bcd4b841bb5efd7c22c9dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffa174c37c08483e1f6e3b5a6710cccd

    SHA1

    f201e864af9189d55f691a118d77ff151ac4f40d

    SHA256

    2d793fc4a697ee90acede9d974780dace0215b86a2b0e0eaba4a4dd31bbda5a3

    SHA512

    51ed17a1efff159462994b2846f301baf8ae5f9f272b981ab91baee354bb7cd0967ae23b1e3c4293fe921c48238418904df0488fa664987002f4a35ff6c00474

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4974836b00c0d1e01f9d662d6ed3ab98

    SHA1

    04327fd4d005f2f45a1e7774c8de2dd69e93366c

    SHA256

    65474ca5139db8e030795534eb07b6a8763e3b82f9f1c364ac526ed44032ef2b

    SHA512

    632a629d35df2cd50f1ccc6d10b013d86552548bab3373e6b7aad1d8d244d2a530794e4b00378bf4e276bcea1c5554fded911aad2a539a35e695fdb679033e2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ade31ae903f3c6dc3eaba2aaf135d038

    SHA1

    243eeed7471faa8253b287ccd03dfa2a3943a8b8

    SHA256

    ec860cf1af97774f76269f85f87e3ca4e631d9e4217e5a42d68e495ca161691c

    SHA512

    8e3d3965f8c36cc787f0d63f506d047769ab180c715f5a6bbbbf1caea6ac8602b717525dba6b372a427f2a2712ae1cbb514b5be2ec69c28f7c8efc5cdcbb4e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6b855b6eb284e63de4f22d153aed52b

    SHA1

    99f40c56dae67cd92c9e4b354cf10f1acff1619f

    SHA256

    d464d9a799c34bd3b90f3ae01b9f6f0f7ea061765315a79f4f1743c348d9a38a

    SHA512

    51387578505495c27a3e432f3eed3a56d1ae7b995543ff29bb97c4751d20d8fadc0451e62fe56ce9741eb5e2845fc3b92174c5fc284613fbd8de27762fd4c4f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ff0e3dec00d3b6db932ee5cbbf696ce

    SHA1

    5ca18e06c37f3a28698e6fe0b3166febaa69d157

    SHA256

    f715f2fd959c507a847116a1cd5152367fb83b058dec64eaaa6e8fb81deef25c

    SHA512

    6b3d95d2cb7e31c415c039cac3e2ad710d631305e486c72ff6ee572bde37c81580e4a0fbac4dee8278f83d35a48f696c4e07b4b3dc5a5e150b78ed02720673eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07eb7816610e0edc03bac957f2e04706

    SHA1

    4591f6fb5962bd06ce520e1b69796098f6313697

    SHA256

    d6b0d767a5051696feddaa70b393d45f269265be1d3c39a4197958801d94ad3d

    SHA512

    d7b7ea3123d6f346ecd0b7b6decbed840e481c9a3918385ea7798b624205849df0ecf05457fc00d3d5b95a7e33981369507f74dc33bcd111a6bc241b884e44fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab2d2046c1ec6b8f2c58d8da2d672e3a

    SHA1

    d9193dbde2d40dae8627dcafb546e7de681ecbd8

    SHA256

    90ed2221e15b386bd1b1be5749547bcf5d7442a58924326411929af49b72ea62

    SHA512

    d3137e33d3499c22d4ba01f21455ba263dc09c1123515dec98ba0edc6c650af5c20bfc9a1c4094eae134b5636d5cc26279f4905d4cd1aa528b3d9b86ab71698a

  • C:\Users\Admin\AppData\Local\Temp\Cab1C87.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1D66.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b