Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    97s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/04/2023, 21:58

General

  • Target

    email-html-2.html

  • Size

    14KB

  • MD5

    92f88f7b9ee3db4d215bfdac75251670

  • SHA1

    f2da5bbc59e51845c54c9e2a9a1a34b5e81bcccd

  • SHA256

    3503e2ef57f3368d8257a569d668628f257cb668b20875fd10658cb710fd8cee

  • SHA512

    58970b9cc5720c6082ab9cd0cf698ae2a6897f0a418b41a6e408faac1c602a28ae35ff322c574a3018979050d9ab041fc2bc6cee4f9f9467a5803d3faf177913

  • SSDEEP

    192:R6YkLy3Wy/eL8uetHPMdpt659xVtHP9dlp0ytHP9dQCymyc8bsIpRQDwyVa:E9K1PM169/P9Lp0iP9CCyEW60

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    e1841d4b00c8d6e4a320024c2aa9c1b6

    SHA1

    52d47fe099e45484693c8856e93309876d6b3788

    SHA256

    70303a872b940ee804983c29b9f7d21bca993f14625b74cb2a2ad133754138ea

    SHA512

    bef66a46d3421833ed40f003bf49445e15a9b337f50250a011e6af5a4bdc4d18c3f5acbfd433ce5c4ecc901831dae818aba410acd3a9d1b884b5c6e8534f83e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    11a360a8dca8ffef1ff13ef85f5abe05

    SHA1

    60912f467446e13cfce9d2de315f007d0d992d9b

    SHA256

    f876269564d4be0fc1540cf56e159c2f5c0faa9de6a0e3ca6a41a9b319f57270

    SHA512

    13f13958e09076a7e0e25e4bc0fc079490db3c98d3b9ec082969222e83406977a087f5fed09bbf4ebea1178bbf7942b466c65bcc4da83e2da1f1ae52c9efd2ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    058b600b8260a61233c7720d5c005743

    SHA1

    3c09afce11ffa08e77bcab48043943b71cba93b6

    SHA256

    e3f898a4726bbeee9ed0d332124ea15cee2ebfa97844754b124d69d25d57f832

    SHA512

    26a4fd505b176180e17f5aa1ef0baeb5d3437a5fa802a1fa664b30a644d11cc790538025fab4e6ce9327ea4799c00e6b4efbe62aacb35e7798c5189a62687e2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5202bd2141453b853e8aef56c0ccf61

    SHA1

    522ecb9c15d8ca37c70b99ea3d6c03d90be1cbbb

    SHA256

    03f2dc18f764822d306aeaafd72e9718eb2593209ee0e0a704d4e52817d098b9

    SHA512

    6a05098cf4366eef57f16388b0523fa15e384cdb4b4c70e1f756a619a3467846cfcf50948d2484c23912732868f9d2ca480c3cbcd718324fcbb079518e174ba6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    895c1ddc12ff2b7439983761eb48729b

    SHA1

    925b77d5b4edf02d71006d08aebc327d29a1ea1b

    SHA256

    5d80e9a3b657666db842fb922d9e6658bb41aa76134046198486bb7856c9c18a

    SHA512

    3f71786eb707906a78404883e0a861c4b9a26fc019b5cb00a7e6cf18c178c678588807612cb6976d08e3b6d77518fc59daf01b406b78eaabf44f1149ae562a0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1db596e6a6b2a0cdf5db891d2f64c4a

    SHA1

    e13ca8959d88d9bafbf2dd2bc728ce8e8e30c11b

    SHA256

    73ae72d07632a67e35336328dd90048ef6bb5e0065d965d235d938932adb4d46

    SHA512

    fd8e9f25aca2ebcc4214556422954a42c7c6554e0df20699ea41c124071aee1f9fe0e4fdc4b12ea93de176c16518134f4244cec295bb4e731d21946336c597ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60ff51eff2d8b4ba04f545c615164c06

    SHA1

    c1b394e25c425366d98d57dc3380245d3d81a5ea

    SHA256

    2328aaa1087b461bbf8f05a4bb28aa22d252d9d6e6a9ba476184e8bc944f7d0a

    SHA512

    5868053c0181ca2c81ab52dc90aaf0586c52f2f69f27101a6d53d05347acb9753957f417009e9d69b684a7a6398d57e9f176c7265813ad78c66758e01ca807ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c841db6fc6245dc905181d9c4703166

    SHA1

    db94a9c36e715973d3981da0360cf8230f5ae50a

    SHA256

    a50f0001518f1db709ce9e88623af23593da8a205a8682a9450187fb20a4817e

    SHA512

    b3f6efa770ab924a43499899fc49d4cfc9db68bd4add3679a88eed1338f28838370853eab2873df324a393764422adc8fd473eb7f627cc126afb4d5f3a2083fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea334f0c6f96ccee9f92a941ec8ae34b

    SHA1

    1a966135837611a1e712a19076cd639009f5e868

    SHA256

    94d9b90bf9f7ca84d190f6873bf03e237ea4c4c9dc390acdd0b4891522592399

    SHA512

    57221e838fd6207ced70e79281ca2923d09ca07fa39d0acfbac1e5aca6f89f39f79f2d4d11378da4e72050c00fb709ea52dd8c2c24fe74d6176d88de202abdfc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab196D.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar3D51.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AVA7H59S.txt

    Filesize

    599B

    MD5

    0eba01aaf1cf72c00fe79b1aa815ff38

    SHA1

    fcb583dfee3535f2e614be00424db78e245b5010

    SHA256

    a40f3eaf155530f8b3f2d5d49a409669b4ab2f8bf4831e27d38c5bf948d06ba4

    SHA512

    fcb9add92392b18ddaa57a02c2ff188dba7396e4c0f7a87c7649d55ca81b003cd7c58246418abfd619dc3ae53e38ec4548cd1407740d979378590fe791a5821d