Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/09/2022, 10:32

220908-mlc7jaeda5 1

08/09/2022, 10:31

220908-mkc55sech6 1

Analysis

  • max time kernel
    67s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2022, 10:32

General

  • Target

    Logout.html

  • Size

    1019B

  • MD5

    3341da747b4e47e2604681ff6461c268

  • SHA1

    ced67776c6f7c71756f973634bf66894acacf16e

  • SHA256

    72b7d2dc3a9aeb2b839a93b257f064fe3e513a509e317415bd2c222bdba280e0

  • SHA512

    5cef3419332cb2f9b5b461e8ebfc96fe52ba59d44606543bbab47afd9428127e0d817bb4341445137aa3e591de9fd00332ff2179f241874930948b93c73e6db2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Logout.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da338d2c4870bfdb5946cb1f22a6b8dd

    SHA1

    0473a35c478795fc92ac4b0417d6c8a050d57785

    SHA256

    0375bced1d3cdb2d8472f0e02dca5df98354d8afd631acd026c64202a5a5b637

    SHA512

    33244b757ebe64e98146779afd136db57d23e7a3ebbf9847051a662d0ff4f06f330a4ead417f8e3a3c599e10d5efc2e861d9d92272e1b38ccefca92e05fee503

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    8e72c20d707e45be58ea7929d83ae484

    SHA1

    e3779000de9e9615d1b734434d30f865fa84319f

    SHA256

    f14cd55241a84eda2348ef857d0d4323ec02bfcf95adad5a38cc04a67bfbe8a5

    SHA512

    d422796a2b4c3024155b1c6608e450b64e989f6e9277497fcc7cca37e12639434b8bf7c1b55141678ec4d4e3c1d7116278be22a79e93c3b989686c687a219932

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FJVC63PY.txt

    Filesize

    603B

    MD5

    a4446b292c946c546a57f2aaa838a70f

    SHA1

    47d5df1821ed8e3150d2eacec7d2cc560453aa66

    SHA256

    52a6cc307d6b31f84f58b8e7a7e1a3f9e3052b632ca273a5b5e888d89d2f03b8

    SHA512

    1e5954e5cf63692349187e5c8bafacf35430f95863564600cc2045ab6e686a5abde03612c79f7a09ee64a8e6455e5b283af8fcb5101a03bf01b65df9659cc2e6