Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 20:27

General

  • Target

    d4862b6bcc1c37b64294551512ad11d8ee7000f9b6e7d568a8590d7fedb147d8.html

  • Size

    2KB

  • MD5

    501c6140a5e72178d2535559f68bba5c

  • SHA1

    eec12f5669541ed29516aed1209d77d5dd6e73b7

  • SHA256

    d4862b6bcc1c37b64294551512ad11d8ee7000f9b6e7d568a8590d7fedb147d8

  • SHA512

    98bcd690b738c14b846f8418e7573487c7ff06ecdf5be141457306ce2341954e42951af8b6d71a699318f4c8ff2c0cc2afe5429dd402f0bbf64efd571f0e74f8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4862b6bcc1c37b64294551512ad11d8ee7000f9b6e7d568a8590d7fedb147d8.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7IP2W5VM.txt

    Filesize

    606B

    MD5

    20e443d2148f8c61443c1eef30aa9af0

    SHA1

    33ef209ae86ed3a10119fb3a57ef30ecd8a4182f

    SHA256

    7c438ee4368c8a3f2417636e2e0eea7d9c5043fb354342197c071a4268ed24bf

    SHA512

    c19c93363d6d0b3c8953b926d82657126f45cd7af677b982e8a20c3a4dd0566687677bc01bc8fea18033fc1408338954d5764494099b4c1790488164eda4ff98