Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    73s
  • max time network
    224s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/09/2022, 22:17

General

  • Target

    5436cfae7e0df48277308149b41617bc56377f6a742e937a102ff0d106a03090.html

  • Size

    6KB

  • MD5

    3588e997b81d43a9de7eeda3a5137b32

  • SHA1

    b0557ff1197d5f2e238d74d3456ebd70ed1ab19c

  • SHA256

    5436cfae7e0df48277308149b41617bc56377f6a742e937a102ff0d106a03090

  • SHA512

    b480f2e5b526f5e16adc7de12b51d1935738a9471465d284f09d6d153cef712ef9baa5ef4a22a9fed2c9aafa0f3d3bee9b9e0ecdf3877aa0c7e173dc7c7d4425

  • SSDEEP

    192:ICgUXmXbXqW0N0v0CaBz0wY8yr/kf2jRnQ5/e:IIIr/kG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5436cfae7e0df48277308149b41617bc56377f6a742e937a102ff0d106a03090.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    1520b1f0e8660cc8553264ce46871efd

    SHA1

    70c43f2c0b7599f782461590f8e1650a2df5dbfe

    SHA256

    8bb8dd5446da57093db31c10b4093a2378a9324f137d3eaa21ab0027e191c09e

    SHA512

    6ad8d5f620738988286981654070c9a4e2542f629f4e5245381143a2a88c98922145759ff8d90546e1a617639a7dd335ddca4aba5435fb216c01c705bc4f0be0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    b1cfc63df52ed19609b3ea7081723ff9

    SHA1

    444be57593556dfaac6fdb2a3dbdb4bee1f62501

    SHA256

    778435c4dbc9bce8baf9ab8bfa13c1ac607ca40128ade39404eab709fef3ef31

    SHA512

    cd747c6266bf748f35e13bdc8779590b8453c32d9abe1ee651e0c35e49f735a8364bfe2d58839fd8da77dca72da36c1c2d6c37c25cfa912836461ba873f7a10d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\00LHSM09.cookie

    Filesize

    614B

    MD5

    f70f4c0a2e9b95593bffb822226d30f3

    SHA1

    a2c0b596ffb8bced5d73ebd2b0e1f45063c57a4f

    SHA256

    58653c5792a79b429f4cdbee68c671c068d693c7b8e822768a07a2a8f898c770

    SHA512

    bcde22a06ada52d79d3526a212bc0e059de331823936d77445990cab9f4af4f4d3a89089a9b666710113017a7ece19b1a4c3376c36542fdc368e2aa0482998b2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\OD4RR7HI.cookie

    Filesize

    614B

    MD5

    5ad0b838438caf1ab38c73fdb6d4141d

    SHA1

    78850b31ff88b5c240a7ca86d62f2a0a646cf133

    SHA256

    a998575cee2eba694432c245999163616632cdf5de14f157c0432a46af3a7117

    SHA512

    e1524badd67a77881f4de2c12e14705d760d78f74db8c741ac23cb0c0b0c2e4e23e936d8322461370fe2626096ea9c418fa5d9249a2c25857c930942401de4fc