Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2023, 17:24

General

  • Target

    https://tinyurl.com/kbt2va6z

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tinyurl.com/kbt2va6z
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae8c311259833ec07b8e69eae124764d

    SHA1

    75acfaa71ded566169f7ba6479c23b2354fb2724

    SHA256

    4cdb37b38afba08ab21ada3f3a2d2c9ae4e59e8ec7590f7b3553b84661ea9fc0

    SHA512

    3661a142be14845b8a0773e420446a093b7bc25508bae010ece5d838e97b9a82a781ee8453b55ccc2e7a6e8490464a1073b497ef2af148cec1fcd01614e9092b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    10KB

    MD5

    42937968d419cafdd8f12db03835284d

    SHA1

    91963c479667dcf8880cde2a85ea860d2a44afb3

    SHA256

    6d7e970ceae7879352b1c0ecb9b8bb4b26377d66eee458c12b8230640fc858c1

    SHA512

    b4eb0df4cae15d850730db3b3d30ec28611171170ed63f0e2763a8515da0dd8f33c16dc9c886c6895bfbb7ef50ee4a7990b1cc276da46aadc2b3c38c4e509ff1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QCDS1VID.txt

    Filesize

    608B

    MD5

    00ec7f8b0e7bc97838773b5e8135b2cf

    SHA1

    e3eeb051611ecf9ff632e36de3d28158a1ceb63b

    SHA256

    a112acc8bc6f7c6ed95e39abc37a0bcd19df2ecd56e75a4fdd8fb9a60105ffe0

    SHA512

    a5f312dcc684641a5e8b6cc43b9008f80a853271925530c717266934c3e4804a2f62cfe479311ec30ad6efb113d1758357f47df74259adc0161a1122bfb9e86f