Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    73s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2022, 20:12

General

  • Target

    https://click.email2.office.com/?qs=6bc4a7f7960a8dd7bac5ba7b8e8898627ad07a2bbccc72208d6efee759171b57fdeb5e6006721987f7d9c54b60ba6ddbfffbfceefe45e880

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://click.email2.office.com/?qs=6bc4a7f7960a8dd7bac5ba7b8e8898627ad07a2bbccc72208d6efee759171b57fdeb5e6006721987f7d9c54b60ba6ddbfffbfceefe45e880
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1016 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfa73c107c0dd2a5c81a7a6294df4ebf

    SHA1

    b066946ed21d323cb00baa98e9ad93bc8b6f4ca9

    SHA256

    d9a388b1d0734e599d9926dd52d7439ed904cdd2308b658476bef8c414604b19

    SHA512

    5a29ab70bef3c57d1ae7f00a99036fb2775318de91872af9c6e61a20b7417e72052bcfdb80a184a49fb00d0d3d192a4ea863b8307b5b68d27c5a9fa0d25f77fc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\E4N46057.txt

    Filesize

    603B

    MD5

    e12e718f0eae5e51a603cbe2405944b9

    SHA1

    024251ce88ef6d12e02aea1358e3d32c632e1495

    SHA256

    358fb5eb73cbdd00dbf429f723b00313c1ca89f61e20ceaae68cf4ead4a182f5

    SHA512

    b41db66f92d4a4b0a8439b1b83daaf3ff7790cb85d35a2dc321157f6f8247b49e1ff0648d81dcd514531f62f7e55c7f32ff7cbdd835761ac9b8d6af4e95bc25e