Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/09/2022, 19:00

220926-xnpnfsbgd8 1

26/09/2022, 16:07

220926-tkzsgacdhq 1

26/09/2022, 15:41

220926-s44ebsbca5 1

26/09/2022, 15:29

220926-sw34lacdbp 1

Analysis

  • max time kernel
    111s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26/09/2022, 16:07

General

  • Target

    Users/kmlarsen/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/W4YE5R4Y/☎️ Voicemail Audio Transcription.htm

  • Size

    13KB

  • MD5

    743bce526b069f0c70069210fbf399b1

  • SHA1

    884b1d100def065ba2964f81bcea919a44a3a2f1

  • SHA256

    2dbd2d653764003082326aacc9b1267075039f95446517cf6560a74785828e16

  • SHA512

    e0b79bc1cb7be72282ce7373957c1af7f3e2333efe60b055a0acbb3fd6563da7c39e1a0520597797f99d7f28b898e19f2957103a67cc954c549964fac24c26eb

  • SSDEEP

    384:KbcrRYCh//If1GdYxNAPoIIklxYq/KxnppHltlfKRLWcwgWwaThTZbKob7/:KbcrR95Qf1EYxNAAIzlxYGKxnppHltlj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Users\kmlarsen\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\W4YE5R4Y\☎️ Voicemail Audio Transcription.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1b6a1c1d810f4fd9b4d3f8302d14846

    SHA1

    42aa7fa6eb009a0e198cdf6c5e995aa8dfc364c7

    SHA256

    7b2a69408025e4490b799d8c06aef761290ab2638b50d5d45d56e60079f25443

    SHA512

    f28e6c3ec5a36348f67cca62b6e2e4c434edbb191abc0c9fe3e453fc54e7cbd1d0a90c3548fab29b6862bf27dd1eb1cc18a18b8adaa35653b926c8fc7c2e8e8f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9CBCIRMZ.txt

    Filesize

    608B

    MD5

    5a4c8c1e6b411539e66cae5713d2d785

    SHA1

    80d0c521cbf2f794f338bc2ccd835aca67d0b28c

    SHA256

    3375a21f892bdc747283e85bda23999f9d37527e72fbcb7a6fa8a06781539c0e

    SHA512

    06849e519bd2e8cf41f55560c257c5e859e1e4622af5cac0172f4c4384b91ad265826714295b321cff071a6861e5aedaff93980479b05ae01e702049c8c79233