Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2022, 02:29

General

  • Target

    dx1.html

  • Size

    36KB

  • MD5

    d67636e20a5cbce3ed98bac92cecba22

  • SHA1

    759c82805dea7c4b8d4160d3f6a340697ae9f623

  • SHA256

    3d423112f84b7ebaaf7e9f9ebd44394bc44d3e56b35c5f28000270c048960bd3

  • SHA512

    184168a3e98e58e0e58074cfe9c42578fb4b825096e95c00a6f3eb9ade8ae579aa0304c132cbd714b164d113d9832cbe0f65b6d74f8a9fcf181cb2f0e0963a20

  • SSDEEP

    768:RhBjVs6/L1vmsmTJh5Gs499JQswtICapQjQeTSP19kDSfrtBQSfMMvXtt9rScast:RvjDpvmsmTJh5Gs29JQswtICapQjQeTo

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dx1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:896 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    baaf0386a79a1a76ad33b58bfa23660b

    SHA1

    3256084740224309dc7ce9d2fe3a82858bdd3232

    SHA256

    6e49cb43e2862be21093d5eab1006d9feac066b6e99743b26ebc2f81b257aadd

    SHA512

    0885c1e08babe72dbba493062222a562032cd2008ea64adf18ceb370588b81223e366e753ca60f0a2652889ebbacf192ed77d6ad8e82ce771f08295044a802a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e09bf6e90a8202713a107a664fbd530

    SHA1

    9870407474a3b1d2f6690af9500598bc74147ad0

    SHA256

    85a11fd59ea711c83be7d2f53f081896e60cbc7b3fde46110c7e5fa7dfb9294b

    SHA512

    a8e695b9a5a57c6cf616fa731efc2741dcb9446f5c7dd44486955c77584e16ce0de3917f3e4251aa741fb51f1bf4b6006adf8220dff16a875540efecf7d39bb5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZQ1ZJHDM.txt

    Filesize

    608B

    MD5

    d5269eecb2d3c0844cb41b1ab3167960

    SHA1

    38cd9af6c88c1c5b7e221743a964c8f7c3c23dda

    SHA256

    b704d17a34f7f0a5bce241b5adb6335821f3a78e56bf5fda0ca56308d9ff891b

    SHA512

    091aa7f183fc938e3826ca3c1221aa791151547d83c9653474fa1fd75cec2e9ee293c1baf45764ec360e4d65316bd2cc1fb512a664e386aa28c2fafee8ea8209