Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 10:39

General

  • Target

    https://members.gatedtalent.com/lr/Clpvs4pHSTpMF0T-cOaXYfVUMnxhhYHj5Y5b8ymc7DG40mj6ceUieseE_aCpNsWhu9W9u_2jbqSWGsK2vvm5NZEd6QxnA5US3NUbCSWp5Ww

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://members.gatedtalent.com/lr/Clpvs4pHSTpMF0T-cOaXYfVUMnxhhYHj5Y5b8ymc7DG40mj6ceUieseE_aCpNsWhu9W9u_2jbqSWGsK2vvm5NZEd6QxnA5US3NUbCSWp5Ww
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1016 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d3ff0edeee7d1ea5754d8a290ae01189

    SHA1

    253ee24a4776d30bac0aedd7ea213adea6acb6f9

    SHA256

    e2e542a3681c428c021d38e608dffa43da666f6f3c53f623c21dc184639b222b

    SHA512

    ab14449059ae31856026e8d8cb0ec0b4158da0fd19f2a73940a159574a9084ce6a09ac05fb80ef3ab11cd9b1395dce021872215baced48f9e8a0bf7311000db7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    ba1742ff33813d0a87335e86e763ebd5

    SHA1

    08e809db5a7c5d30876f09ea9dc56a94e0efeb22

    SHA256

    41fd3d5756d9f1bbdfce91ca99e7740a529e3153a863401d864fe5194fb123b2

    SHA512

    aa065d368fdfc707de9ce9babaa94294272ceca03c0b0e1935b8e11c274b02f9d3fdd15f6b8769284307adfe46e2809713a4b1feeddd9bfe1e59e3b187c287c9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

    Filesize

    620B

    MD5

    bcde7d165625bf14437f286189304859

    SHA1

    3eac75c66ba400188322bf7cd7715ed445bed5f0

    SHA256

    64b5a19ae0bddb7b034692089c5b7fc1ccdc909bdaf6882975d0db9dad584260

    SHA512

    6759b59bd88fe968f25f17ce9ac88f33607ba6dccf9d9c7dabf1660197b62f1f93767fbb0623b5295ed368a7ab78a1ec4f45b0ac323bd0a0fdd0a2e16aaba651

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\47NRIJ2V\favicon[1].ico

    Filesize

    488B

    MD5

    54d3627f629157129c0fca08ea71ad2a

    SHA1

    5df9d947e16f8bef7dfa5b4184a553a35682d2b5

    SHA256

    ddbd4f7947505d2c9b341f6d7345c90a3e5d2750e4e11dc3e5adb7b57d83bae7

    SHA512

    a0069d43c416d544b539958b41a6c2a722b17a17e7e10bf4c91ba2809b69c453f7d46fdfcf6c333bd5a148a57f88ec7fcfc6afd3085dd64b1d3bc17d96da09b9