Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/10/2022, 14:48

221017-r6y2yscbc7 1

17/10/2022, 14:47

221017-r6bxescbc4 1

Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2022, 14:48

General

  • Target

    RFV05KJSTW093FGSQW.html

  • Size

    197B

  • MD5

    44a996bfd69170b3ab20fc34e8cf203e

  • SHA1

    0705154751a757b976ac23f852854205d153c290

  • SHA256

    629af1c59e3b773bccda809191c580569d2b3b01591dcfe1cbc13a6d3d17777a

  • SHA512

    2977e4ab10a6e0fc43302d2277a67850c6c4c6dda8d7528e79f4a47c80d0b161fc0add2aaaade122b0dabc3c635124dddae6eb36f227c91f039ef507fa379e7e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RFV05KJSTW093FGSQW.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cea94b17aa828da817f304089b2bb9de

    SHA1

    f93e0b6103536bec9c15d18ccf0c6d47bf8aec80

    SHA256

    eb9bc6acc7131f23ca2884af0f691ff25066572b68ccd40ea635993b5909ec7f

    SHA512

    9a09873e00f04b75b8ebc4f06d075c9a45e2453a0eb4359d1109c32998e0b2206f6e818fc67d79d6acc952229665455d0f673a5bb3c0a9b7b96b5d4fb9172df0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PXJIW9HP\favicon[1].ico

    Filesize

    32KB

    MD5

    c1b7b01a77373a4052ced836ad18e760

    SHA1

    a036f28f8c38f0bbf05bcdb1478af1b288d65011

    SHA256

    69721f70a637170c940ef0553d60ecc7fd9525395502aca8e4ff278285b949a4

    SHA512

    a7c6b4bedc0d16c8053b65379e1320a87a4e6019ddf675e25580c43729b11f0b7bc93139ad950ec459d0acb08794c389af7909790feb62f014da871e3dbe3a54

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TFI52I0F.txt

    Filesize

    608B

    MD5

    8efbc12cbafab42ff7cc54b0ce0b98bf

    SHA1

    0fd21875684fe135a524f2e4439ad41829155262

    SHA256

    b9581a3805b5a202106ddac99109e7f2b359513a7fd16e67fbdc3542c2c591ab

    SHA512

    bfb6313157af9717bf30048953f460694179180adc41301d7277e227dab0dce37b34aa4df824bf864e142030a9242ef93e292cf4bb51c7392ff80516e5c37d0e