Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/01/2023, 19:32

230110-x8xvkahc72 1

Analysis

  • max time kernel
    67s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2023, 19:32

General

  • Target

    https://year.zzetaEnter.xyz/index.php/campaigns/cj13753olw4c2/track-url/ee733tsg765b0/bdba96e0600757f843af4b192fa9ffcadac114ec

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://year.zzetaEnter.xyz/index.php/campaigns/cj13753olw4c2/track-url/ee733tsg765b0/bdba96e0600757f843af4b192fa9ffcadac114ec
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4596 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    2edb0497a0b1af9ce4fd1678e28d33ca

    SHA1

    a187a6aa5d6a6adaf84d883d45393d3467a969a1

    SHA256

    ef88897d83afa3568fd2b4d8e4c3dbebf153081b157b16074a8ed0737411e5bb

    SHA512

    fb929af42c1a5438a5008b67953230b3864875af25529f12bce1c4f7c4ce467e66a35ff18be15f1a0db9c81ab5f2dc6f45cc0a0b7d9199c4e9c1274557256d31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    8aa909cd2cb996e912ff8224a0a9eccc

    SHA1

    f3831690a1787bab19e28d449e15e40b85b13bd6

    SHA256

    bb5dea21bf1178125897b0e43e06a3173a06e3c794884f98eea1c499ff2488fa

    SHA512

    2bec7c2c1e82369cdcc38f4b58dffe3903f58a71afc29c4ef2ced11b79c5ffde3acef060242d10410ed0f402b7e36a61cda2358db057fb5bb46899be165ca7cd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3mhxqpl\imagestore.dat

    Filesize

    322B

    MD5

    e3f1bcb31d138717ead86bd875b469aa

    SHA1

    fa34b49bb1291e4232cae0eb0ad6a79fbb9911d2

    SHA256

    b82c41a42f1eb17b60089e6188f8195c26b26ed2fee051d46c0ead4c5b26eba4

    SHA512

    d1f76139d6bb164583a6e5ba1dea6dd7ccda94eb8aae6727f9b0b1ecd533778022b32a6d6a31c0358b3a53aff40c7c95b0675a27034732b4d5e52f998afa22cb