Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 20:26

General

  • Target

    10687c910d508a5a450ab6f256961a9b0b5146ea8c8ceb9c4759903cb23c2b1a.url

  • Size

    139B

  • MD5

    ca35fbed361ef15f93a4954b81925c14

  • SHA1

    7263a9a49deb5ce318a147d14eab79b126e1ee48

  • SHA256

    10687c910d508a5a450ab6f256961a9b0b5146ea8c8ceb9c4759903cb23c2b1a

  • SHA512

    c33ef8111b6970eabc588e89adbbfcd5d84216b2b6206660243bebe9803dc2daf9afa2f8e561b9784181142d69dd7dd4430e792a08f29d626c14bae6de44ccac

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\10687c910d508a5a450ab6f256961a9b0b5146ea8c8ceb9c4759903cb23c2b1a.url
    1⤵
    • Checks whether UAC is enabled
    PID:1132
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb581f5b37e60b0a792b3117cfb27dc8

    SHA1

    0bdb9c76f94de8f1e513ec071e6b3b91f1f9373d

    SHA256

    78030b7340c0b9a2f3386abe9e506dedbe758714cc9c24982f9d495830eda64f

    SHA512

    cf5684c4428b5ee9b64fd5076da5c7cd8c71b3684e3120123cf572574305a2b8a8ecb9f687e72a9246868d05b77f08ef32e5692e7b17f6de76fcc2fee34ed027

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    5KB

    MD5

    c3b0e509f08a2f4f3169df2e3e90a197

    SHA1

    133a54cb878285a0d359421981e70ae829a5c2b7

    SHA256

    1a3d7b5017bd1cf5545b5641f6a56b6814285451df6671eb402369e20beeb22c

    SHA512

    7d1a7de900d92a61ae2b8cbfe9c64ae1440b4035cd0281d1ffcc713ada39c3880ce073eca4668d986e5b5de7744de907c107329c94f8b2c5818bb0cde719348f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TB1QB09Z.txt

    Filesize

    537B

    MD5

    eddcbc391ba6a92baa22103ba95dedcf

    SHA1

    bc2633f3a95c3cd82dc9c9bc704eb7fe116f9898

    SHA256

    43180301883f7e32c750f56746e30875d3b6d4744132e62de5c2aab4636b63b6

    SHA512

    51ab7b25ee6dcfa91ce8b1150da0512cbf241d34983b83fa39120794ea3ef4de7b22352ee1d005f8933a1d4a9b6e95317376654f6c7a9d6e2023a9d599fbe45f

  • memory/1132-54-0x000007FEFB8D1000-0x000007FEFB8D3000-memory.dmp

    Filesize

    8KB

  • memory/1132-55-0x00000000002C0000-0x00000000002D0000-memory.dmp

    Filesize

    64KB