Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    67s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2023, 17:00

General

  • Target

    https://rise.articulate.com/share/brOqYgAsTijn-QPSczR7NK1BFDbYsCQ3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://rise.articulate.com/share/brOqYgAsTijn-QPSczR7NK1BFDbYsCQ3
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee5d4228554f5f10c25d842326c90735

    SHA1

    56100ee0a1fa4489cd1c83f5a05430ac4f40d02d

    SHA256

    de82f703a1ae6b80a5ace31e9b94c4a635d6235412fbdb7398a1e6546d6a2d35

    SHA512

    eaeb1e93f61b885a6650758da561ae1ebd1d08a93eba0d7ba80ebc2a3e257effd7e019cf277b579de5fb0c7ef5aeb37762f03423f4f1d2b0e13cb9528da0eb60

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    19KB

    MD5

    d27278e9fd8667c313a7d8bdbffc483b

    SHA1

    410fbb55bff0c28027b49ae87f14f310f7b6e5a2

    SHA256

    2457ef5fb09f3e845ba5dddb65b3bf76949ee6687bd4cf25152cca87179a519d

    SHA512

    dfca22d68f2eba0e2a870fb522ee7556ef7b4c99feb879eb1ce41d843189176e99cc49ac4372b952cd28c10932ca693b950c832b6c80d57ab8b82e3fea026871

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IAYVNLD2.txt

    Filesize

    607B

    MD5

    e2261bc72c347c62967099f26fe0cb9c

    SHA1

    bd2731056425a8a368b430bb34af32ceba7aaadd

    SHA256

    e4053666690027a6055ea1c1157bd8b6ad088883bcdeff13fa50710475813fb7

    SHA512

    e0b5d5aca4944a4d1c475274e99c407fa242cf06d9c3a33a7ec0a0f75ef252ae26e4353c4c0739b02f58229d909ae827c5d07ad4d79eaca953443044375f7fd7