Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/10/2022, 00:16

221005-aktrnsdcbn 1

05/10/2022, 00:13

221005-ah6cpadcbl 1

Analysis

  • max time kernel
    265s
  • max time network
    265s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2022, 00:16

General

  • Target

    123221.html

  • Size

    15KB

  • MD5

    dfed4916377d1fb18d4715e1691f39dd

  • SHA1

    97ff169f4bb1df5b6e0cd5c5f793a3e7740b4b0f

  • SHA256

    d8b1cb752c4113344751fe466909a17c6c4e77a86a4bfeb33946f434af53f6b0

  • SHA512

    a939b3c864cf935a8031c224d872819dbf1cee08ffa5329fbcaa48b746a0274405a81d1d428f6350ea4c44c268587dce4ec22d1fe32e78578a597723bfa7452a

  • SSDEEP

    192:0J85p4OIKskYJlst2lrTAUW3t4I0a8VfhQBYcWRXo6su84D/Cc6mgjMnFEnr:6jvVRlXot4naurcyJ7Cc6mgjMnunr

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\123221.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3516 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4840
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3516 CREDAT:82952 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      PID:4068
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    afc3e2584b32e1e7c23c33e9534089a5

    SHA1

    ea4e2266d010c300621d2287ea60fe3e9a9ee753

    SHA256

    61597f5f937da250a5ed7b4b82867bebc546a5a35c0029982a003b1e9cbd2e7e

    SHA512

    f0e0d20b15bc390292baf0d93d982315afc466ccd2d4e48152ed65af97aed573d5b9e65b2b50925cbcd2e736955dfec4f63de5739cdb1499eb2db5dfc3cc4fe6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    5398c9740b2b0a4b27e5b7d618cbfd41

    SHA1

    88891f4b5ae56140e8a6df3f1380a64613c8d758

    SHA256

    63b9ed3c269eaedd5e99dcf4cfee691cb2fae421105ecd0c326bdba2e5ba29b0

    SHA512

    ad397bc77eab307a1063a14d80a3823cf62fc48cd6c92a093f0ccb5bf41461a8492a491407c64256ebfad8de796bd45b5b7f1b902206555839c01be7e3304df1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

    Filesize

    9KB

    MD5

    c772683953a00497ed157f565298cf25

    SHA1

    79001b0b6060b141f07776ff95f6433b0d050234

    SHA256

    44c2c7b86e8bd31c9a2f672d924e8b8160369518f21a6d130c40f1714f3b5332

    SHA512

    479be6e7d39e11fb0aab1d336d215777c8bf4c6f912d9f49c024d0460882a7e0526bc15e4a8682ef6e47b46c3d3bed11eb47ae2ef1532c614114ec41a3838d4b