Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/09/2022, 15:55

General

  • Target

    ThankYou.html

  • Size

    1KB

  • MD5

    fadb27169285f9afc664aaacbeeb5fd2

  • SHA1

    2ca38b2a3cbe5388ff2aae840d6875bd5b6ce233

  • SHA256

    72cacf2eb02d9b220556df1ba0f776f79b8b1cb7bdb54fbc508651ec754ca0e4

  • SHA512

    56b2f4155fbff51aae20ba4b669378d96a4ee38920bc47046fcb1189cdae9640fb5b4668eb0af7f60c548f343bceacf41f12b0545f711ddecf7ccc99ef590cf2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ThankYou.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    00b1f97d4e1485c64073488b6d3dba5c

    SHA1

    20b3d0ac69c301190904219e9f2b67fd60328c26

    SHA256

    7ceaf63621d71767db30bd6382237493ca809bd8901fb1ce3b57f19572c4c137

    SHA512

    8f3046a4fb672660cf58e8aa7d3425b5e81d85a98009dbe2c88addcaaabf2c7bd183b24d7a6f82f22a024851bfa69a16b03482b24599192a7926ecfc5436a832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    b7c4d54dbe338fb4f6a0c6e036a3dd38

    SHA1

    d80771a4aaf2699b11fc8f6bc5e7f66957587275

    SHA256

    3d5c763cf9980f94185db07db7b52520ae6d37c0109a784bca46f56fd64e0c69

    SHA512

    5f0dd99dd8860fefe54118c659f08d9d0aabfb17f97421787bf307cbe7ecce5712d8a0a716f7952d8a6278571e3e346810beb948e6cd73a2c3af391c6d370d57

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\C67ECKH6.cookie

    Filesize

    609B

    MD5

    af10dc832bf0c1be601e457a506597dd

    SHA1

    fc1a3c3fba8adc7b0ff23007f909e3dbda72570c

    SHA256

    4ef05c6b6fed1592b0b143abb0035eaebcef093c37dfaea2516cef7ee833ab46

    SHA512

    30a81f16cdfb24d9753f6590061f62a4d73578f0c7c280b07b60e2b308ea4ff219e08690f5ac667871ce4f0366211c6a8f5e6c73112cb9628ba12972fbe35c9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KHWR59NT.cookie

    Filesize

    607B

    MD5

    960b989f3b33bc54457b0806490bcf72

    SHA1

    e89eba70dc19be228283fde5a130736b9f1a3636

    SHA256

    fb20966b3c5129e74f4ab770a6b1c969ca7e95349d2b0e3ba445f8cd500cd27e

    SHA512

    3dd6c66d165466445e06c6afbd39bd552f68d13ecff2624fd279123b5bffb0bd793e9c815050bf403657b11c597ae39fd8265cf30d274338d775b012d8d11ebf