Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 14:32

General

  • Target

    ڷVIPҸ/77169.org˵.htm

  • Size

    4KB

  • MD5

    98ee6e8383a3693b9aed0024c6c56295

  • SHA1

    ed862d3c419ea991d642c5b302df213e2cef03ce

  • SHA256

    516efd1450fb09e7afa5465a5e2b1c874aab81b0864e3ee1ac4a225d6a69a81b

  • SHA512

    5ceee4b944526aa67ba8a6fe1d9ed9cef118a69e526947b77215c47f7614302a5c7ccde13b75e6bf13eb2eba7e8fa6ef3f233aeb39819c19de1d095ffac85257

  • SSDEEP

    96:mQOQeRA2RWhwM6w6mheySgh/SnljQhhwQZy0X8LJhLoOlExbRls7zlaQLIak:7X8A0VdIYehu2hwQZx+JhLoOlExNl0zI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ڷVIPҸ\77169.org˵.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    b18435a5a7ad96d1540b8d45bc7fbd5a

    SHA1

    f65cf833e132c002b60fee747942d142be8377e6

    SHA256

    c752a6fb27811b0773e71545946643ae70887529f895fa9f86feb9ec77e7a915

    SHA512

    57c1626a2f3604633036a50d8a32ecd7e1583079ba73040dd0d8b7ec29b9defe4343026f86c47a4f75098281c18a93ed319235d95cd89c1f85a4d9e075f49c73

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    31253fb89ec13cefb17224df7b3f491e

    SHA1

    ef04e22a83f89f642b23ec0700b552eb4b28b710

    SHA256

    c4fc436e6edd232201d73d04b716e6a26fa50c470af39436549c82ef3400e16e

    SHA512

    33dd7bfddd7934d341a545044eece03de94255c7b92a025ce36fa76d91d6525aab3929c618a25a33c0dd4543e3361228bda7d42dc8495c0f9beb56ff36f2afb0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DX8JNB8M.txt

    Filesize

    599B

    MD5

    20fa626ba1f52e220a77455ba33577ec

    SHA1

    725b35ef68f4f485d65ca6e8b48d27616792c275

    SHA256

    15bb178fe6fd32d1b8892343cbebfcc5c762a4ad77a05bed28b416d9888ea863

    SHA512

    eb690da828229eab0531de240a04829447c1868b1dc8f53fdc89c2443f86b627625505611602a921538ef40a6f298f13daa1b7e4602fac5f4e3f1278573bd863