Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    86s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 09:13

General

  • Target

    http://subsworker.bid/?endpoint=f-wWo-Ns0Mo:APA91bHuxR6aJbhb01VCPaa1Dr1IrV7NGQoZ3iCuIUK_l-c5XzxcGGUPkd5f6FI9od9xlgrOw58RRRZNkbhKkL5HZXGT378hh5FdIl-oV94EvlZujsMLfqSV2GkZMYwss7PTfIyd6JFG&ver=2.

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://subsworker.bid/?endpoint=f-wWo-Ns0Mo:APA91bHuxR6aJbhb01VCPaa1Dr1IrV7NGQoZ3iCuIUK_l-c5XzxcGGUPkd5f6FI9od9xlgrOw58RRRZNkbhKkL5HZXGT378hh5FdIl-oV94EvlZujsMLfqSV2GkZMYwss7PTfIyd6JFG&ver=2.
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4004 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    fceed7a5f76725fb398c6a91ff552899

    SHA1

    237aec000ae7c7c35a639664b1ad6c0d842a0749

    SHA256

    2888c66a6908f10474313b2fef31aeeff40cffe1bcbd19b84b29334ff6a71383

    SHA512

    adfba4e72523d38395c13122d6498d9b48d93b2967858f0208549e3830c9b47ee3e98249b98fe585aeeeffe491a6985a98c80a3be581abccf4239bad4d1cdef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    35c9fec708ba57909d008ba4d3a43d9d

    SHA1

    ef543dddadbff32bbe8d24e3913c212eb0c17e3b

    SHA256

    fdcce55e1906e294a5e914b32531ba0e668880023417cb4d172ff07d066d63cc

    SHA512

    8f80012a9857ba7f343c2758e22bdb0f4b06f92edbda465f3dfd1faf61943759c16ffaf3d72239f549e4ff57baea8b7a6fb6952dbcca01bb615519f3c3c4c77d