Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2022, 11:01

General

  • Target

    Aruplabrder.html

  • Size

    5KB

  • MD5

    5a7f4987024570c1ca96e414684e07b2

  • SHA1

    890d2aff11ea62701736961f0bc893ad8b7d9681

  • SHA256

    91b6478a333208ccf749061dfa71786a1656d93e800708fa2cf9e308d5144492

  • SHA512

    e3f2aadc124229acb7a35b735251c3ae2e205ce5257f63c50b4af34b8e7362caba492ffac6c37373ca03893f9069ab065269b858ac35c13e8810fc4571aec51f

  • SSDEEP

    96:nx+7dkYxh8qWezvrznyotifQD/RbDviKHp29J88R0RimlX1TGkKTQY2E3zEY+Ict:ykYxuqxr7yoH7RH9HA3vR4qky2EbzFoP

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Aruplabrder.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    109f1fdc227b792d5a67df7a8d515986

    SHA1

    9db59dd3995952ec922aa5115d4461e3b2243204

    SHA256

    7d3f8061950f138c5bb30b865b93662cb133b4b1fdaeb347794ac14ebab14149

    SHA512

    ea5e4428f59d186d6929712918baa8d643d912633f01679e30e7089de51c5362dbc8f87e8cdb1f04d2176156c4ff2cf2583db95b9aa19073d3cb144f5caed4b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    7a0e7bfacce99e4f484c5b7cfc8d81bb

    SHA1

    9899a56967af53d8c43abbaf2d8dd59df1c66317

    SHA256

    1037d116960f81df600041c0759678d6305aff2eb9f308a6ca089d08e00c4cd2

    SHA512

    dfa6f2853f6073d2f409dbae280fda8895f0f1545c08c9ce6fa72af050b05a15ca7075d396d6ee71f8a112e9166306fa0c3e2501fee59aa1b0c7dd348b54b41e