Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/01/2023, 06:48

230105-hlan7abb52 1

05/01/2023, 06:45

230105-hjjt3sef2w 1

05/01/2023, 06:36

230105-hc7bssee8z 1

Analysis

  • max time kernel
    73s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2023, 06:36

General

  • Target

    https://antispam.safe-industry.com/invitation?lang=en&id=10bd979e-a9bb-4fe8-833c-7641709c42b9&utm_source=DA-en&utm_medium=email&utm_campaign=no-robot&utm_content=onpremise

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://antispam.safe-industry.com/invitation?lang=en&id=10bd979e-a9bb-4fe8-833c-7641709c42b9&utm_source=DA-en&utm_medium=email&utm_campaign=no-robot&utm_content=onpremise
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4604 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    99446fc0c7f7d4b12e462a96d9aaf7dd

    SHA1

    84c6f8ae5ee2370c549af11c93fdd27fd0edfcc5

    SHA256

    37f9bfa1c3e5af64ecd96ec2b31665edd3d62211123153fbe4d3339ff0556f8a

    SHA512

    fdabad9e26ee09498e38711e3466c5a5535a75d1525f2764bdd587742407e5e596767195089a3f6aafd49ec001d9137b571372daba0c0cec1149d42ef6f0f64b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    c879b0c6151904782a3086c16281ff6a

    SHA1

    11ab74c98c129a6335ef35f2eaa0283ca8003427

    SHA256

    6ba75d6d212f5cb6e812f9b88fde2d5a1e79eab1606de3bff539bf06be728798

    SHA512

    090a9ddf62449056a5917787d968a16d6b1bd22f915e7183cf2f5adea92e8998c587eaa4f7d8b51e37e3cffcb1ab3198ff5b4148235e1427ac7e0a840ca14a00

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    778B

    MD5

    4124bb92c2889b46f44d62f80d84d64d

    SHA1

    e3713f79e94d0012526256b72d25ae5a786c61f6

    SHA256

    62a2aea4ccd18a80e500d12de47820e821c1e0b0eab3020d71a7aec1408c865d

    SHA512

    30166a352a9e49f671bdcbea23ed23139dc6ad7dd74d84bb4c4c87cc76474b3394c97a1e42dda8f5ad51b3151829a081ca5587f1e9746e8837037fcc94233a8b