Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    80s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2023, 16:35 UTC

General

  • Target

    =?UTF-8?B?Q2xhaW1EZXRhaWxzIDQ0MjYwMyBNYXIgMjAuaHRtbA==?=.html

  • Size

    162KB

  • MD5

    0e2fe80daef3afc3b18a1980f95162ef

  • SHA1

    5fdd75392124a7f09cef5eedefd960a6f29a89bc

  • SHA256

    f160b6e3050d46a4a90b8a052f40b4d8fadca1b258433499dfe5c42dd2d3c9f7

  • SHA512

    83999705bf741ab9268cd639869b16921cefa3217ba04f102d57078d9cbaa19521224473f0a44f3424453adc632216f41ca8fecf923626458d42a4bd6ae9feb3

  • SSDEEP

    1536:V3msrYmsfmPx4iGAcsNL2nFWaevZMJKA0S/gdouarYmsfmPx4iGAcsNL2nFWaev4:V3mdG4iG6eJKAWdoyG4iG6eJKA7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\=_UTF-8_B_Q2xhaW1EZXRhaWxzIDQ0MjYwMyBNYXIgMjAuaHRtbA==_=.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3292

Network

  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    106.208.58.216.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    106.208.58.216.in-addr.arpa
    IN PTR
    Response
    106.208.58.216.in-addr.arpa
    IN PTR
    sof01s11-in-f1061e100net
    106.208.58.216.in-addr.arpa
    IN PTR
    ams17s08-in-f10�J
  • flag-us
    DNS
    35.36.251.142.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    35.36.251.142.in-addr.arpa
    IN PTR
    Response
    35.36.251.142.in-addr.arpa
    IN PTR
    ams17s12-in-f31e100net
  • flag-us
    DNS
    76.188.69.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    76.188.69.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    131.179.250.142.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    131.179.250.142.in-addr.arpa
    IN PTR
    Response
    131.179.250.142.in-addr.arpa
    IN PTR
    ams17s10-in-f31e100net
  • flag-us
    DNS
    232.168.11.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.168.11.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.232.18.117.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.232.18.117.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.104.205.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.104.205.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    8.3.197.209.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.3.197.209.in-addr.arpa
    IN PTR
    Response
    8.3.197.209.in-addr.arpa
    IN PTR
    vip0x008map2sslhwcdnnet
  • flag-us
    DNS
    177.238.32.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    177.238.32.23.in-addr.arpa
    IN PTR
    Response
    177.238.32.23.in-addr.arpa
    IN PTR
    a23-32-238-177deploystaticakamaitechnologiescom
  • flag-us
    DNS
    64.13.109.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    64.13.109.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.197.79.204.in-addr.arpa
    IN PTR
    Response
    200.197.79.204.in-addr.arpa
    IN PTR
    a-0001a-msedgenet
  • 209.197.3.8:80
    208 B
    4
  • 209.197.3.8:80
    260 B
    5
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls, http2
    iexplore.exe
    1.2kB
    8.1kB
    15
    14
  • 93.184.220.29:80
    322 B
    7
  • 173.223.113.164:443
    322 B
    7
  • 173.223.113.131:80
    322 B
    7
  • 204.79.197.203:80
    322 B
    7
  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    106.208.58.216.in-addr.arpa
    dns
    73 B
    143 B
    1
    1

    DNS Request

    106.208.58.216.in-addr.arpa

  • 8.8.8.8:53
    35.36.251.142.in-addr.arpa
    dns
    72 B
    110 B
    1
    1

    DNS Request

    35.36.251.142.in-addr.arpa

  • 8.8.8.8:53
    76.188.69.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    76.188.69.20.in-addr.arpa

  • 8.8.8.8:53
    131.179.250.142.in-addr.arpa
    dns
    74 B
    112 B
    1
    1

    DNS Request

    131.179.250.142.in-addr.arpa

  • 8.8.8.8:53
    232.168.11.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    232.168.11.51.in-addr.arpa

  • 8.8.8.8:53
    200.232.18.117.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    200.232.18.117.in-addr.arpa

  • 8.8.8.8:53
    58.104.205.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    58.104.205.20.in-addr.arpa

  • 8.8.8.8:53
    8.3.197.209.in-addr.arpa
    dns
    70 B
    111 B
    1
    1

    DNS Request

    8.3.197.209.in-addr.arpa

  • 8.8.8.8:53
    177.238.32.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    177.238.32.23.in-addr.arpa

  • 8.8.8.8:53
    64.13.109.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    64.13.109.52.in-addr.arpa

  • 8.8.8.8:53
    200.197.79.204.in-addr.arpa
    dns
    73 B
    106 B
    1
    1

    DNS Request

    200.197.79.204.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a03e3db17abda2b8279c2f4f37ee6cbf

    SHA1

    7470b2553b06790447cec18717a4bc02a24478d6

    SHA256

    341afed6144ebf64136cff435d5654f8525faf997a72e2492fcbc522f3858942

    SHA512

    4c93121cdbf94cd152f6e0f602c9acd5256073536e4dad930a0e1fc7656c5a1132eef1dd53d19c16979329d46916eea454cc65e578667dc8572e38ec5c4c4d44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    1c9578d235da30fd374ff20e26d000db

    SHA1

    ad05753c833f36b6ba7c2af49282c2e498e3b1b9

    SHA256

    511af9a590a5a5e4eceeeb1fa0d5511a8981e8f542e2435045566385d475668f

    SHA512

    e7ad64f5d4f5339b03372c2767d3fdea1858d9bb4594b1a9d7b71a4439673a52ce571338895e2ed4a24bc6ec5f38939245622c528be46523f146641c79d16e0b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9YACFB9R\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.