Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    67s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/02/2023, 14:49

General

  • Target

    https://gsmiweb-dot-yamm-track.appspot.com/24WNud3XARhwmdTlyfiQui-7G0kpW0ILcydwypbZwv7e-A2ExhgFH0bfYQghHWdiSV3QNxLGRDASHGAWjGg7TK5-zLYRphUcFy0rBb36bb_JcIueI0fVtyQ_Yg4dKKhIjf2ZToPid0nmNsS7zZ9l6QJBUSg91g6ErmJF5xJsEpSuO_4JsmP42BcE

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://gsmiweb-dot-yamm-track.appspot.com/24WNud3XARhwmdTlyfiQui-7G0kpW0ILcydwypbZwv7e-A2ExhgFH0bfYQghHWdiSV3QNxLGRDASHGAWjGg7TK5-zLYRphUcFy0rBb36bb_JcIueI0fVtyQ_Yg4dKKhIjf2ZToPid0nmNsS7zZ9l6QJBUSg91g6ErmJF5xJsEpSuO_4JsmP42BcE
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    50481b0e896c0f912930286311691ea3

    SHA1

    47276a31cff505b7788ad7705e1ecc109c51877b

    SHA256

    fa5a10ac1903853f084d78dd22e043d0dee390cfa9ef18d88896de347aaa4bf5

    SHA512

    0fd93f94112a017ae14fd1a1268447c559df7159743c4b2e431e20796bc6ad0edca5c5a6a906a8724d8d888f4453f8812b63e897b30444d22d635c617d2afaf3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    732799504cd27022b512609200471dc3

    SHA1

    cf812fd39ddaa6c833dabbc3827f80dea181e59b

    SHA256

    9ff260069a60f12701e969d9b87541268b81aa85f8c2f65963f9cd77e23bee32

    SHA512

    c642bd0e67b2a2fbb5d3c59196facde27c858d45ae221fdf7ecf807d78191cf45a5ea38fbabbcddb101b4ef9b697d59bc770705dca1337b5a31d1f83e87ab7bd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GNZJG7B2.txt

    Filesize

    604B

    MD5

    ba6aeffd1f558f9e6155638a651b8f60

    SHA1

    426bb682846b49906b34c048787c597e88895ca4

    SHA256

    b58f0093f5bab25030934f57fe9c8188a9a27aa7076f513d6f308b87608b6b90

    SHA512

    b76a15b4751e79ce6a7fbcd4e77d55d379b778a514f6fcd9178219128ce7b926f014391b08c8f2848b770ba8ccf479b4c7f8429af90491622eedc94e5a12587e