Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 17:53

General

  • Target

    https://launcherfenix.com.ar/download?u=https%3A%2F%2Ffiles.launcherfenix.com.ar%2Fprelauncher%2Fv7%2FLauncherFenix-Minecraft-v7.exe&f=LauncherFenixV7.exe&n=PreLauncherV7_EXE_Local&c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/download?u=https%3A%2F%2Ffiles.launcherfenix.com.ar%2Fprelauncher%2Fv7%2FLauncherFenix-Minecraft-v7.exe&f=LauncherFenixV7.exe&n=PreLauncherV7_EXE_Local&c
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1428 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    ad02076ae3272a473d9766244a43df2c

    SHA1

    f3d334136d0842a1cf9f61207948c0fbfc1ce076

    SHA256

    70c6eeedc94c3a327d84706151396df0d3e06856a198c735ec651d589ceb9171

    SHA512

    70cf490e534b682a6076c67394de9edbb6f460525dc520b41fb50a3d3465a6530d1a88fa809442b14ba5ebd860072ab088e431aa10fe20f084258799470826b4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    13KB

    MD5

    d8025a3322612cbecc77059c6c4c2aea

    SHA1

    084600c20b26adc43518cbe5338b857145644ea0

    SHA256

    bc20e298aa0e59701768d33c54ee3dab6187dbbd58c05d611659bd2e544b63eb

    SHA512

    9751dab39aab438098bdeeb0701c1f592dfb82598abca031259d8989fa74b6014c5b2fe74dfe8fa75617da2fb9a0c19bdebc3d6ba08070b33049d482db98fa93

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PMJNEIPZ.txt

    Filesize

    601B

    MD5

    40aa0785ba0bfda11f2a3d1774b10f4f

    SHA1

    38ee3399c9a1ab2e8e7f335bf72fb5638f6f4e02

    SHA256

    fd436506b0e3146c7a141ca14a4ce3bb51d9d38dbf51a570ce63b3d9c0e92112

    SHA512

    4b4e84696023d2e9f326102f56a5ac8c98404c15676dc33b9c3ac5c11fa5be9a077824f9b16b1ae37b40b77661d2df1400ff9e2404db814b72cf849f86d0f073