Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/02/2023, 18:45

General

  • Target

    first release/dashboard/index.html

  • Size

    65KB

  • MD5

    e5dcb26037864fc566bbcda10ccb0e1a

  • SHA1

    46a8cc89002d56e8adc99b2926288e760a3e1cea

  • SHA256

    93ff430da563603c4456331915b838619f254aa9d0d827d623a5d2ad6aa2deef

  • SHA512

    99f3ab876b7e0b7e67975cd827a47c4bfcc0182c0b696a2b4cb1a21cc0a98ef2436112b9953a876c12b189085791d1eab3b3db5d303c8efd05e6736ac05b930f

  • SSDEEP

    768:ZVHDzuDYrUslKetSgSHSzS2EcQehnSNKLA6JTKedP:/WDYrUcKeJEcQesKL3KedP

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\first release\dashboard\index.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    1817d9f8c83af5a97f742f07f32fac7e

    SHA1

    fac61ba5502036b356304703939a905467a7bd04

    SHA256

    07448a3b03c29db66b8782361cc553ad689bc75964c8070d2cd795d0c03f5268

    SHA512

    b9a071c1eb497a26f837c6826b6c7372cf1403d68a8b7adf1251f069492ec1539199303d13fd46e2fb85692b193ab87492624ed34a51b9cfc92d67ecbd638686

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    4f13b3a850ebdf2e0baa5113e6353a79

    SHA1

    98e23fb72a6194a08396aecab7537aa7fcbc6539

    SHA256

    dc84ce119d7e4ae84a5b59c59537cf19f9976e53ea8841332e1b374c734cf4be

    SHA512

    9fa1d8c5c612bf0bb9200da2fb707f9ad2ddc3663e46a55cf792250dff6fd6e6ba8e7191cddbe772eae06e6231e157fb49330ca1314410a3a6a2b8f0d1075399

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KDE3C5IL.cookie

    Filesize

    611B

    MD5

    6f2494022090814ac97e38e2f0f4b18e

    SHA1

    413d20a5f6d204c3d6c1def0942804c419fdb3cd

    SHA256

    c6e6761abaaa7747eef71948621bc332841eb7e3d331a451eb6e5f3d22acff4b

    SHA512

    2d9e396fbaf46b1deba117798ffa9615894f5b928688846b049f590cbf4485b8ca0d44a8a0f4c11bb12f5a25ca0c8c4c6546f3ef12c9d5e85157d32f59683c58