Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/12/2022, 10:17

221205-mbvc3aea4t 10

05/12/2022, 10:13

221205-l9jhsadg4s 5

Analysis

  • max time kernel
    89s
  • max time network
    94s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/12/2022, 10:13

General

  • Target

    POC37100NLC001.html

  • Size

    371KB

  • MD5

    7feec814ad3b6f50786290ca677518d5

  • SHA1

    9988d80a558f034a9f4b990cb7eda02ed3f94650

  • SHA256

    5e19cefcca3d3576ee674719b567ee6f438b33423b7d5f21c43df9bf72e9669a

  • SHA512

    e27b813f14e852bb02aa94d94a4b8f1ca63257d5464fb3431fad7503dd9119fc02c1a4a4a74314f9cb8e21d8695f5ad59a3d53cfe18df4b9f922c840da64c3c0

  • SSDEEP

    6144:tl1+DD/HefegYTCMcOzSr1gOKA49iOrVntRv+B/IbJHfCEI+a6C1:tl1+DVgbMcOST349iOrVn3v+cJbI+a6W

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\POC37100NLC001.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    65f24090ffb72280bcf05c7ed340bfec

    SHA1

    7371a4493868cc1818a48bf7f0f3730c15ecde7f

    SHA256

    e8db62d610248277631a36310634399779a15c05ebbef6caaf701f71fd593826

    SHA512

    7bc1e220ec0e157246722928101c4b91e73739e2d319f7e6f4fc74cd229ce447cadd2b5b4d73ad00493473caa15a8f8b54cfa2c691831536e72290ea25ea72e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    24df9343a53701dcc3a037032e374678

    SHA1

    0a18d0f2be7b8d98903803962b5eeae55fe8db48

    SHA256

    011bffdff60f005204fdd26d06a4f94b81a89b9c462681fc4a56e21d7cacedbd

    SHA512

    0c33cfe106b4d68787b794fac2d5aa027f3d2aa63b0f015778cd6a10d5b6c824a2f9c012b79badfa8d12a971d80ab5a289a181c02aae3bd58fccb68dc892793b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3TB1V6I0.cookie

    Filesize

    610B

    MD5

    8fac085758b2eac1aeac1839a5e32cc4

    SHA1

    72397f095d19adedb91e1d19cfa1454383c868d4

    SHA256

    40714e1c8f2cf11488ee5d2162c98fd788acfe5f7ea2631694283d859d5f59fe

    SHA512

    62dec67fdca4b97edc957a012aadcc9896fb2e5c3488159f9f4a87e8b421eceb036baf24d41479b87c92d6265702c26e9eb48e51a639a34accf92d335a8cda8b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IEQNULXX.cookie

    Filesize

    611B

    MD5

    ea02020ff6aeafdf13b760ca4b7e4ac9

    SHA1

    62353a9e6d78fabf8a11cb6eac45f9e391d5c8e8

    SHA256

    5772865ecd6a81d6302c62c13bdcb3a95570faca396e4d58b32014ed98b9e4b2

    SHA512

    228c97ca1c5471dc9893a71fbc5f8152623df41202ecab08b3b6e3bd8d2dd2150651db5e146a997a11e6d4d040f9bee13457688e79633b74ef6888525004b24a