Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2025, 18:52

General

  • Target

    TelegramRAT.exe

  • Size

    136KB

  • MD5

    d87112c508292deb2c6bb973990110b0

  • SHA1

    7eefccf695fda5f1ee6fa44abc8a089245ca7c75

  • SHA256

    c673ee9500c45d1f0c1425f294ea893256de066ba231d764fdc391b5053d2611

  • SHA512

    4fd4a81948c8f93df61c7c84dcd0f894726c7b116ec912855514cccb14655bda44349bce6273b31ad2d553b79f5f421c9cd3ef3a79136f55f83edff4b5e3a9f7

  • SSDEEP

    3072:93rPVBOw9fEUUixpkLADFN672mIxmcobZnQ8QWkPCrAZukh:9LjOw9fHxpkiFvObdU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=TelegramRAT.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31abdeeb670b487e59a2487bcddc4edc

    SHA1

    92092364e164896b6829c2e1defdc0c5e35cd19d

    SHA256

    2928bfca3d3bae5a21636a39fabd08aca0ceb2f9560538a2eadd1e8752c246fa

    SHA512

    478dcd810bf9b28b2d70a942ab8847475654f695df4e64088f4811abaeeb15a0289775e4c047ec45491f59e1e59d9e111dcccca28dd17d321e67121b468a5e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67b4e97318334b6c95d98d34f9eed5cf

    SHA1

    3c059089d3ea4a0e2b6177a87d48853606e1bf7d

    SHA256

    16566be15416dec81c8b5b7373633c90997785e0636645175d96c72645cc75c3

    SHA512

    0dc0fcddb8f822633f093d23d5c5503434894b4869c1a5b48d7881a0ff6688ec7ae523b566378e51ba42e911d21df0d0a512579894cd10ad53f7ccb80828c97e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ca6731c81339f4ce4d73b4ffda45e3f

    SHA1

    04f941b58846550ef16ad85254ffd67a3f978a43

    SHA256

    c83bad41e55376e403922d2700a398be072ac5604f9e1e9d7093dcdb75f84160

    SHA512

    2fef8ef62611978b73bba4e03ab4a6aacd3b848e4f9f7061ec53bdac355ef276862cb8f9e03703d0f5b1d663f1a23f5e3e20b8b32c53db7f95ab5d36dbb5a256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a383595e3c55d093d71a96550a32837

    SHA1

    0f6e8973e720b8dcce88cdc9bf86c2e45f3e3a7f

    SHA256

    b40390345a0811e8908b734dc9e23481a66b7a74d20bc0479e520debb80d3f02

    SHA512

    2c7df79252bb45bd80515ce4d26877fedd85aa4ec98306e8525d03379968db3b88b49cad33d23683d06b756b03ed893ff869dc927edd5b73671ebd6e008adc17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    567c9cdc6da3dfdbc3657f49c6b1aa96

    SHA1

    88c7b375a620c88d9713e67cb136e631c194f6e5

    SHA256

    cf92319f244de796cd22ac21e03c14f656997a76778437dc6121d449bae6e9bb

    SHA512

    2f6dd024cc23946ca07d4dcf9581636f0e2597ae36535eab919b1405eb237f8585966ce732fada3d7262088d13e6355a4f86332574e59b4a482722200a09f62d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    599312dd6d956c5c2e1a7c55d7b3bf39

    SHA1

    0d0b48c368822bddc30d13e209dace6a73d82fa3

    SHA256

    e2e229462a2248572b61dcf006351be96bd8143a578a9a113174695268a883f7

    SHA512

    48e09a686d55c59843cafff33bfa0ce199e45940d07a9d1957c15f62b5d87b65a7750a663de2840517dfaf5e5a0a0efd2b37b61d7f72aa4370de948e412f9318

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da41cccb449ec42c8c4dabb0da6b1340

    SHA1

    938d48835f01927d5f3ae102ff7e5da8b5c932e2

    SHA256

    dc641dca7053fa18deadbd9ead6fab74c83a6b0798f0377c59169edda7af2c1d

    SHA512

    d614e44f3a338ffc3211b6439b38e373fff11ab553eec7fc616d9fbf7e1e6d7c0c3a1ca687ffc0ac37f2220f5d66acadb01a1650a2299e62fe44ea5ee170fbe9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32236d4a4f1627cf668d1cc539c7fb84

    SHA1

    5a678e7e3256ea8227da8d090bbc151144d97772

    SHA256

    d0ec5f84f68bc0658c665755854ebd510cd9b07a9d06f31c393f6729311bac11

    SHA512

    ef817146aa30cccbb3218636408a9f9e57a474258df2f0479e4c9ec1ea255ce40dde3b246373391901901f1496f23de74a52c3c7de1e8e4e3d0a9541e8877b3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6f14aa695a281962d3e6dd283c9fba4

    SHA1

    596d7dd5f47b5430b40bb741efc74ccb98304b6d

    SHA256

    ae580c3c51cb76e81603b49152c2d5bd37d5e0dcdfed14f58f63fd3c113c6379

    SHA512

    047decabb173876d236af0636ae9753380bcdc793920fcb25d49563964dbaca74d4a6632f0bb18e968e4918298e8f77099aca2d4df6a08f1fd3f006af7febf83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c74c3e40b2ee9e583d9875ee08ddbcca

    SHA1

    54410160e384fea7fe03822a6d8103f6cadb129b

    SHA256

    7eb27d8186a924fdb9ba2e6c6ddca427959ca699b6041d29cfd708ea42d6c6fe

    SHA512

    886bb251d6e0f215762de5fd4b88da8a3a5591861aa988ee483094737724601a9fdce1fe15987d604c544d1242937d5397cd7287735651eb1adfc45920366c04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acf776baee5638e9bb405711763757b6

    SHA1

    41d40dd86526de5a402086082a6d01aa3fe8b603

    SHA256

    9d82bcd7cf5346101b4684547632b654bec3df8dd82d5ad9640ed340233be6a3

    SHA512

    bde739d67f6379d1b98760f3e4ca2c6a9e26fb3390aeba7ee7dddd16e100fe5ef521968efcf38457181479fcf1d176a0a4d61e63bb761a59cdcdc4cb6efb6dec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b08a10c826b4aa1c959ed0e7a76484dd

    SHA1

    90b0142afaad405f8dca03a5ba0dd12b1369a6ed

    SHA256

    744ef9c015fc1bd3d82b61feb09a3af6a71f2d4003df2a5d113c25554f4ddcfa

    SHA512

    63cac586f9e7ab115e0f7c1cd213d1ff5c997a81c9796408145fa950eb7e52c3a3e6d1e02686ef1f7b50a489e8d9b1ab93dbfaf9224c33c5a62e5e83c7e9ffb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3f5747815dc8e7db0fc04f6cc6607a0

    SHA1

    89abb3200e4ffba367e06c52b7aee01a552278a7

    SHA256

    00e35e89d4cc1fcfd057d91849efeb81c035e15e1fe549f102e661d0cc1d987d

    SHA512

    8519852b0f1188577512854ec4c964c601e6c84e21eb3d3a503d9ade1ef66df07a8c5666b90ef2b2827464f014fa777ff3b3200fffa1fd6127107afe0f1feca7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51356800d54cf851f3b3ab017e562f7a

    SHA1

    4825366709af83c46b40ec932c0f9834f28b7eb1

    SHA256

    76669d0b9e37e46f7fd457172850c113a00116dac309a658a4d21a1b08c6a18d

    SHA512

    52e792ae50e5430464403a70ebc25bcb3c43f021fb8a24d55dd4193dea82ca1873ccdca4392d0ef6bcb2d432905f310ec17a02554f80d65d7b35365aa33ad3b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cc6bcd890101f8c61eea8c9d8366c37

    SHA1

    f8021fba555a648ec3cffb8af6b3821d5f1f8550

    SHA256

    a240c1a1908394f744875b8adf8e15fdc194c57b7a751388a84d984a06d80dfb

    SHA512

    cabfc7d2ae83f0d3f5d1134faeb504fe49d5ef370b4983417eb64d27a036063cacc6ae3a91f71706bad9db9331c1ee9c21a80996d61a2c481ee8b04671db5433

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44f65a064d8e87adaae122bf935637bd

    SHA1

    ef5f651fb12f8b36cda4ca46f2d0504cab2e89a4

    SHA256

    90df7d3e42a5417210d25e0709b111b1daa5d6f0fae95a95204a26899b708c26

    SHA512

    e0cf19b73fc3f813f5f08bb4b2e62cc7bbe2f02ec27a28c62e734abd19c64ca739286a7d3f1fa3b196b87f97696175ef4af2c8359a648cf083089e4973163458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dbff7cd617683537a368f57dbd74586

    SHA1

    023120a4967ba8bc991b735716f0a1ed3ffabafe

    SHA256

    67a750c100fa16d0d36bde91cc24293b0cdb24a6dc08a9891e3ac4c10178db31

    SHA512

    1c67279070c1ec3bcb14ee6d95e271f7ae9cf68bb4fe2130312cc44119eb9f1976dd27509678e91263e2e27419dd687a1f1cf970fb6e20a443fb2d3ebe8cd8ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d72a325c15768014b9d49d00c121e67

    SHA1

    9bc84eb485dfc994b48f23221d014b25d3640310

    SHA256

    1ecf831ca820c992346992c63c6f8aaaa47227a7aa7e920ec7c80c5d5e3a63ac

    SHA512

    2215b4b647aeeec4dcb06a0edbc110ccdf7582b099d0f8b0edd388661751b171c5bcbc2dcee59e95b4ee1d1ce7af26f11bd513d784067352c595c24c340be8ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dbf5b856271f287ae1d2383df1e95c0

    SHA1

    fda4b726e06a925995620861dbbd7c7b74d84856

    SHA256

    f539ce3c2d9e5770db87684fdbcc97c8542c169ae8c7ddbb6eaab6f40ca5bebd

    SHA512

    e4121da23a74351d79287e9bdddb573a5a136092cc9fd8ccb9e5e0dbab583cf5f99bae80a17530fce4293e80b1c696b95cad384db05fc2d4a58f894f041d7638

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f95d5eb8393a7b6023b14351122bd80

    SHA1

    3a2704b51025ed97fb4c2e03356473e19ba5279a

    SHA256

    486be1fa0e46dd27f25c4941856964a3008c9714f69640d9ee0627089cc2fa0b

    SHA512

    c2012d79f825c988307cb3798430490e0f3ea7cc551e5d884ebe5e55206c6647fd96e44e91e74f53ff3a5fba196d2ab532d2c850d88561c1b51f5280bedac9ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c384673214b44769184e6b214e23a91

    SHA1

    c1f6531cbc9e6705dc48f97911b569ce8c27c524

    SHA256

    131d734b50cd2816c5cd97d13cfd0f42bdfea86f9d294547f6383b74a3d048a0

    SHA512

    ce581172e8cc2621a932af3c1fa5bcf294fa53390905de245a26ade0654099bcc3b639d073e6db4aa35a77e59d43fc8fd43c53f91ce4ffd4eb063e48ec6cf6d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b81df19687deedb571f29614bad6049

    SHA1

    988f3779ca208f4bff97fda9c4e34f5949aa0bf6

    SHA256

    87df60b6301a1107bda0f80430ea53d33a5171f68e6fae277129ab3ef244bde3

    SHA512

    20f4da3cc956aec545725d345b6870d3b48d5e2ce1e1371ab3d3105f43b39883e55e4633853b6689fb76d0130d559ac4473037af53928b01c924c8684e6e3c62

  • C:\Users\Admin\AppData\Local\Temp\CabBE90.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBEA3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b