Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    16/02/2023, 21:17

General

  • Target

    ACH Direct Deposit Notification.htm

  • Size

    41KB

  • MD5

    41374a59dd088f37618f8fe5a5a274d1

  • SHA1

    4400a6d5a570b533830146429a56b1f80232d048

  • SHA256

    ffdd547458f3521a9a146b81f06e9672a715c7ef50f46bbecf9d65532098eb30

  • SHA512

    71a36aa8a9a1faae1c815b9708d39ec1dcb5633269f53550d4130ae6ef016e7335dc3e8b27817c4d9e510ed242210bdf850f6cc1e3eca89f82cfb5592e7b2aa9

  • SSDEEP

    384:TxXsoRZ3TlNmsE9uGoWjDowkxXZPOFEoEmEXE2iE0I6EWX+vr:JfBTl4nty7hUq11WX+vr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\ACH Direct Deposit Notification.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\R23WXYL8.txt

    Filesize

    608B

    MD5

    4fe851f9a3677a4888cb0238b8b67cd5

    SHA1

    5fd4c74e9cf748d7fed41f10976bb9e38792467b

    SHA256

    68d8500ee2fb09ba069b5c51439bc8cc077944877b8ad0122e4aa3005660ba8f

    SHA512

    190ada677237032afca036dc91b44823361ac97649a82524413c012f31938b6d6ec3f7cb261212df70d55a1ff6dd0110ab28e412596e79ff4c7cdff1bc7045e3