Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2022, 02:29

General

  • Target

    index.html

  • Size

    44KB

  • MD5

    75bc6e964209ef220b8a32f77a3ef96a

  • SHA1

    1946e24a9d0739a1a24605790ce26084252729e2

  • SHA256

    3270d6084c6c28c6c6918105379dfb6a24ee89508aa689e472e617c0835dffa7

  • SHA512

    5484bbc4f604fa2091fec23c3ac30b9513b2fb5eb1b6bf67e8c51aedc629ffbe0f18e098b44d37859d65e09ceb407add00ce9226409a53f80fb8560f5134ec7c

  • SSDEEP

    768:RhBjM6r7cmTJh5Gs499JQswtICapQjQeTSP19kDSfrtBQSfMMvXtt9rScasUhrv1:Rvjp7cmTJh5Gs29JQswtICapQjQeTSPk

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cecfa9e3f6472cce3647b5822643a421

    SHA1

    7f5e4ddd97c985de171ef60e6621c519c1c235b3

    SHA256

    f837cd438cbae48dcf91ff45efb2cbd89c654684337768ac9741bc3e97707df3

    SHA512

    353c6686c19e7b79ed95e998000021411963f8a6e9c8c87419c5c88c42580f6462a78f32fd896d4aa9a94689ebfa20da2b379555e5d0e5b4babdb52e86c5e05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb92d81889ae9a850e857c3ab291a7e6

    SHA1

    e8907ed23679ea1fa48ae10f65709402cc7404b9

    SHA256

    8ea8b9c3b6df31a17b374ff4af9b2ed02345122eb3df4f957e9855087f3fd77c

    SHA512

    de16241e026db6b2e3365d30e5003404b377bb54f2ad5ccbb4f4a3968da428ccdd4f78b15e03e5dd0def6c4bc0649f8cbc3c27cf94546b10465a73f5d0c743dc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A7JVFQOH.txt

    Filesize

    608B

    MD5

    afb58fa95b5886ec6d0ad6c88c2b5c16

    SHA1

    5dc7eda810e4423e9db182f7700b1c2c4fd9feff

    SHA256

    dacc7c4b6c7f72936502323e225ff47c4c07a31901ebc6173c8e715c70a4ce76

    SHA512

    f6bae0ccaa8b5fe5c2388eadb881483937b5a67f65cd50340679eaf2fe99971a73b4adeda9e7ee98af3ce1a8248fe853fbe90fc1f10455832952778c5f24833c