Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/10/2022, 00:57

221025-ba2vzabbel 9

19/10/2022, 05:41

221019-gdw2saegg3 1

19/10/2022, 05:38

221019-gb4c3segf5 1

19/10/2022, 05:36

221019-ganw1aegf3 1

19/10/2022, 05:34

221019-f9raqsfdbr 8

19/10/2022, 05:29

221019-f6qj2aegd4 8

19/10/2022, 05:28

221019-f6b2msegd3 6

19/10/2022, 05:26

221019-f45wyafchq 6

19/10/2022, 05:10

221019-ftnjxafcen 9

19/10/2022, 04:53

221019-fh358aefg9 8

Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 05:36

General

  • Target

    http://we.tl/t-ZRlwhHea1p

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://we.tl/t-ZRlwhHea1p
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4004 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    460fe13d503bfbb113c3ecee607f5a31

    SHA1

    52df07ae073bae09b9093fe2c60ccbe7e8dc47cd

    SHA256

    dfd7a4b3a98874808e3623cf75216dacd47b4389916e0faad7e0ed289743ce0b

    SHA512

    383f29a13884ec9268eaba1ee47bb73243ec7f4eabdaacaa77bdb2de2b0cde5f000b7ea527179c75cfa30666a06a9333268e06b4cfbef91f4d2b82c119818d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    25e521076adfa8215b00b60e2bb2ccef

    SHA1

    245d4ac46c6df57a930789af85fc94398cdcdcf7

    SHA256

    c83251148be758f04a7719e0dd445f7719230955428bc3b15ab55661ec0ccfc8

    SHA512

    fb8ca91bc75bc3b3ca5b537402135bfb3526101fe6ffa116ede6053d2b3134ba1cf8eaca513c8cca02022f2ce45289311e66c9e15c63137a42353f6b08a3351f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    41KB

    MD5

    36ef64e49f2409c8aa514c379bd1465b

    SHA1

    714aee80c8bbdfed2b04eb4966211fcd4c903034

    SHA256

    99c021b54c1cf78394ef05c28f9e773df5fba36fbb666399d6bdf5d8e6c32896

    SHA512

    65434add00efc6e882bc328dbe0de554b66df5451823317744462679979e5a5920a7aacb9cc4aaf4b8d490c1784da2fbd86536180378b5a40a56f5d2237291bc