Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    68s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2022, 02:41

General

  • Target

    aescripts-flow-v1-4-2-for-after-effects-full-version-free-download.html

  • Size

    108KB

  • MD5

    489dda1842ee2ac014e0c9373bd8c31a

  • SHA1

    bf7399e587adc8137810c344235abf44844a2d2d

  • SHA256

    422f0f9405e631bb6c23750470992a8b97583886080700d6bcc6661bce4781b1

  • SHA512

    7b6854cad2196d30c05095762122046b493d5f9af7f99839d1410f0f06f00e6b3b52c77b35dbf1beaeab5e311314bbb1115aa55f174a1d1de4f551e2d55e0530

  • SSDEEP

    1536:X4PrioyIBvztsNxv173GqjirKj6CnQ0VoParGo9GhH3KQjspVMmVLfUdT2xV5D8T:aAn73h7njVLrfGhHajoDX/1d7Wy7r

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aescripts-flow-v1-4-2-for-after-effects-full-version-free-download.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4736 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    deabbdcb221537d48aed54816739f367

    SHA1

    9ce0f0d21d9bd08823732047e19edbbd909396bc

    SHA256

    494de69d83714780f68a1e6871716f3a4a10835e90b4f96e48610c3e8f39e9cf

    SHA512

    95a80c34ddb83e74e51e5d0884dc7433de78b956db8fb2b1fb54e0f158283991edacafd3e7653161767a69f25f9cf537cc1a654d20e3f27bbc54588b3b4bf5e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    3c18aa5e068f9789dd80b270c30866ab

    SHA1

    73a1d7969f3f0b29ed35363e276fb903c4e89223

    SHA256

    a0f01fd3f6cfd6c2f6280866b08ca589e8a5ba0a074ddb275ce11251bb0c7ede

    SHA512

    92d4f6a39e8933c17d209d9636857d13ea6291699a5bdfd4b8cbb0e8092a4ed7955fcf2c893c6d1b62537a4cf7199b6eac90dc0efdcc5338981b61092d5654af