Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    199s
  • max time network
    242s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 23:55

General

  • Target

    19/index.html

  • Size

    4KB

  • MD5

    9b4764883a609aa87ae954d89ae36a5f

  • SHA1

    960ed127e50d70c3d36d827006030194c4f480a0

  • SHA256

    ce74374ab8ecdc49a65dc95432c0549ad7d9a70d0cc080dab7b4ea5483adf8b4

  • SHA512

    31da3abb6f9ce7348668ba19af4b0ef3ac42e40a8e9760c884d305e445307c20ba01e055a1e323b737330319425f9ae61ae44366ba3e2959563a1762d36dea81

  • SSDEEP

    48:qu/Q+My9jzIoXBANp4zAB8AutlEahJ4QUiJy8xYyRY5NafPFg5gahbzRT4nJGCTg:vMcIoPLHhJZnxYyA+8hpKIL/ZGi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\19\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4LURMUAR.txt

    Filesize

    608B

    MD5

    dc2fd6dbf801825aa558d7fb014dcc52

    SHA1

    8962adabebd9d0f4af5572013bac2b3f669f3a65

    SHA256

    ce57b341eeaf6f72b2f16ea5a3e769475c7b56a105f49804d89848141ee40f73

    SHA512

    0946de7c5a7dcf767de63cff6a6e3a1496c172b9c2656df4210e2048b460be2108893b0a5afee3d69ad3af3029258d508b327f315d99cbfb7f5c4b8230185873