Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 21:04

General

  • Target

    589f61cb3a8fdea7794cd5c2015cfac892ac03d925ec46788f4575689e52e4e8.url

  • Size

    341B

  • MD5

    7d3bd9953e6e56304c817df6e09aa451

  • SHA1

    80270114793d7673a4f0e871a528bd6ff7511564

  • SHA256

    589f61cb3a8fdea7794cd5c2015cfac892ac03d925ec46788f4575689e52e4e8

  • SHA512

    868a53a850e766f47bb66b72832ce419a1c35dd1f889f0b2e1d4ab5b2448a16fd3ced61bbf91ab5040d7bb006829dc7fafa4d180e985a0c63f04b799d0d0bdc4

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\589f61cb3a8fdea7794cd5c2015cfac892ac03d925ec46788f4575689e52e4e8.url
    1⤵
    • Checks whether UAC is enabled
    PID:656
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G7E2YMG9.txt

    Filesize

    531B

    MD5

    4b643a449e9cba21d2854b4b169f097d

    SHA1

    b3ed91e48e07b57d5e8149d64127b34e3c0e675d

    SHA256

    0a2a51a690c76a5cf86975955f5acbd3e99193247f7adc3d34efaa12b3d43113

    SHA512

    caad77ea8c03e50ac61c8b65b3bc89f825e3b29ed4ddafcb8a1a57e2e2f2175701cd6303aa002b734637eccdc689af46441fd3a60057822c1d5d347c0dfe547a

  • memory/656-54-0x000007FEFB6B1000-0x000007FEFB6B3000-memory.dmp

    Filesize

    8KB

  • memory/656-55-0x00000000001C0000-0x00000000001D0000-memory.dmp

    Filesize

    64KB