Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 13:42

General

  • Target

    file.html

  • Size

    313KB

  • MD5

    b823a2cfaddf48869444e79203051d1c

  • SHA1

    ccf463bc9584f814ba9fb8367139065334127fea

  • SHA256

    5517a7d250fd9a436fafd4d2b4ddc703696fb88644e203dd7ccd166c13b3940f

  • SHA512

    c40b06b8adaec8753d566765ba0a419d1dca6bb6f542733f82ebad824a2b7d82b318b6bc9f9fe7bc0a610351ff5ea3492006640baa75961770707c0a4e0db611

  • SSDEEP

    3072:IingAkHnjPeQ6KSPq4oNF5TeIH/i4aW+LN7DxRLlzglKhA4:vgAkHnjPeQBSPqv91a4CN7jBhA4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4676 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    5ddb1febcd291eb59d3d67d24a05bfd0

    SHA1

    fe957affe27cb991f332e7f5c86d3a15359bd3b9

    SHA256

    ec45a385c906b3d925ebbe6532d10adec9a14c1733c756c64db5133bd9d88dcb

    SHA512

    62d00893402fae125ae3428da2495b0eb864b125f975cd887f894f7298a4a86f361cf50aaa7c9b69f3dcb734a950c43472778ea4062b3146c3de5623d08dcd21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    4563380771ebf6adea7651fb48155d9e

    SHA1

    465e61b8534ffe9a462618d56a358eb39a15479c

    SHA256

    f9706c0856c657e50eebc1d948f572a6122b732f12f340fd2e666483d09b526f

    SHA512

    6c8845ee4ac504982ed4336bfbf0de66671499f138001271fac97a27eb7a0f826dee6a60904256d7a31a869d6fdf19cdaf9dfa6f1ef6d5a9ffb3e134fae43a3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    cce28f6be9c5d17e435762fc584be7e9

    SHA1

    f1e5108069a5add350221bdbaeafc5511cff9153

    SHA256

    ddead25d67b2fa8a3d4015c1c24c381fb4254b9fc395f94ac97f3ca18043fb9c

    SHA512

    c40486fbbcc53f66ae2a51fb576916637f2cdbfaa2588e6c5911064ab18c3fc706e2ffd21b3d07b59e870e079936a16920892c19ee269656659f17f9abcb6355

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    232B

    MD5

    52d5066a962c7c798087298c11edf0ac

    SHA1

    278b534c248e7e31e0c625f9c653e40b7542c3f9

    SHA256

    b04dfa3b5f89098b6c9162cee493e5bad0d3b86cc41f481f9d15404e3ac729d1

    SHA512

    001515dcd6fb8e179ab6305d1b3e9b630d701198fa9580ad5d4781ec3a4107c7f7fe1cf2f512788e5d72f363035b0c30025aecc2004f4822063944a6c0bb9d04