Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    197s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2022, 02:41

General

  • Target

    aescripts-flow-v1-4-2-for-after-effects-full-version-free-download.html

  • Size

    108KB

  • MD5

    489dda1842ee2ac014e0c9373bd8c31a

  • SHA1

    bf7399e587adc8137810c344235abf44844a2d2d

  • SHA256

    422f0f9405e631bb6c23750470992a8b97583886080700d6bcc6661bce4781b1

  • SHA512

    7b6854cad2196d30c05095762122046b493d5f9af7f99839d1410f0f06f00e6b3b52c77b35dbf1beaeab5e311314bbb1115aa55f174a1d1de4f551e2d55e0530

  • SSDEEP

    1536:X4PrioyIBvztsNxv173GqjirKj6CnQ0VoParGo9GhH3KQjspVMmVLfUdT2xV5D8T:aAn73h7njVLrfGhHajoDX/1d7Wy7r

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aescripts-flow-v1-4-2-for-after-effects-full-version-free-download.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    84e3bed22b2364ef56cc034446adada8

    SHA1

    9483d5cca6b8c271b0ea847bbf6411965e14a87a

    SHA256

    db7f5ddc9bf25cb7356ae650cff6977b80bb7ca7ea267504a795edf6b82bde40

    SHA512

    dcbffb392c588d6f7cfdbf693cf82f66cba8e44f29e6f628c33e0aae55cc18ede7aec9ad7290b44e09bab8eb05fc0caadca04c431d6de827d16de873bc5acf87

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6PXC7JPY.txt

    Filesize

    601B

    MD5

    ee36d41a83166a7079d43117f881a8ae

    SHA1

    daeb8459454faae26352aaa5b363f27a65315abd

    SHA256

    53711dd7f052351675ab3dcf595ff71e133e72964df6ad1bc1a1bf1b11060ad5

    SHA512

    d2665214ddd7720c18b24479b22394a401f235524b792274388d3e5cf2bfc4ababd0afc393e1d5f54a2faa9f0a40b027ccc9dcd3c88d8525e08ff3c3e6f4748c