Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/09/2022, 08:18

220914-j7mfjshfe3 1

14/09/2022, 08:17

220914-j63q5shfd7 1

14/09/2022, 08:17

220914-j6s7psdddm 1

14/09/2022, 08:10

220914-j244eaddcn 1

14/09/2022, 08:06

220914-jzhgmaddcj 1

Analysis

  • max time kernel
    150s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2022, 08:10

General

  • Target

    https://snorefamiliarsiege.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://snorefamiliarsiege.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1488
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
      PID:1944

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      60KB

      MD5

      6c6a24456559f305308cb1fb6c5486b3

      SHA1

      3273ac27d78572f16c3316732b9756ebc22cb6ed

      SHA256

      efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

      SHA512

      587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      30694c6593acbf6c21d67a40b381992a

      SHA1

      c67feffb0a80666ba41dcf652132dd5f79ecbf6c

      SHA256

      60058e2fcc96c8e206324a0791f8523bcae13c9d23c6d30d666b21ef598f5e6c

      SHA512

      8a4fbbedb57d0b521e19995876e9ba63764142841b484d160c4ca81adb1645e0d2042975e75f75d87a66372d4aebf80d8233bfc0d79ff45aae122bc92508a551

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

      Filesize

      9KB

      MD5

      f6d03d150721d68ff5955e7ffe9555bd

      SHA1

      5c6b6c71cc1ee242fc9812154f22a0455f94d2e5

      SHA256

      f900dffd15e2f61f9077da3a0498432480fcad8a375fb6b2ae51a09e97fc671a

      SHA512

      ddd3ae398e1526c98b36b1c67a7161d295f8b82dc0461530e18d4971a105f60d9f8552376f77647b07204af09ca9566908ba5b19f3d60850da55dfe740d979a6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I0SQ0O04.txt

      Filesize

      608B

      MD5

      97bf4730daf6e81d1da34be6dc74e8d9

      SHA1

      ef24bb9c85589834f7355d5a0eaa07d3ae5e5976

      SHA256

      40793663ecafe0bad3b64908e28266dbdc60d815fa43d3a30cc0ae4939c939f4

      SHA512

      a79d8405e3fbeb46b98acb623bc824693e4db0a447627a1540998e5595388af4402d36a62acacc8937f025cd3c6a4edbbc0eb3b159969d0aa972a9c631580027