Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    30s
  • max time network
    28s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/05/2023, 18:53

General

  • Target

    https://appcloudsystems.com/away.php?url=I4WHKFughjLZJXzAMgO4OvxVUoxHTNAw2Gigkd1rRWdJc68%2Fn3ez2z7Zb9nuzSZAKg4c2OGil1cP%2Fe3xYLiXXA0F3UF5i7BQhqq4e9Bbf0CMCSfwBFWMrIJpVScbLn2R

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://appcloudsystems.com/away.php?url=I4WHKFughjLZJXzAMgO4OvxVUoxHTNAw2Gigkd1rRWdJc68%2Fn3ez2z7Zb9nuzSZAKg4c2OGil1cP%2Fe3xYLiXXA0F3UF5i7BQhqq4e9Bbf0CMCSfwBFWMrIJpVScbLn2R
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3632 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    8159fee64c5eed3055149e591998cdcb

    SHA1

    b5714377aa1626e33dc89afcf679693e76d63095

    SHA256

    d8f8443215bab6804a149496ac9855a87924f7182b39485830ee77ee7e39a0a1

    SHA512

    8f671e7d7b629303dc92e37ac43f3419b829ba38915ff57c96ff8d272446f18754e628aeee37dfb671196d8d865072b416873ec5129f354d96ac0ce7e30fa8a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    cfbc16e33dcbef6f773f0f79af528f45

    SHA1

    ecb8d5e8107bc671dd57fb2a137c00bffa419f1f

    SHA256

    f0937890fb1053069baac97b7992c6d22cb74cae20317fc05d51070d96950ffa

    SHA512

    59ac2ead1eb84edffb06867850beb1e63f72c5b5415abd2fd4e7c2a1922c368f612d2a0288c00e32d5da47c4a77968ffbe72660a8d1f577f44fb20df9c11a4af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    ae050e3b0bc6a8b6151d6e596efeeb0b

    SHA1

    3aa61126376c569f0becfdabf7ce892ded2f41fa

    SHA256

    c0d476ff4d3dcc14661c922a0ca5443db08852ff7ce9748200425a33cb152654

    SHA512

    43471fd117d05ee484f7946962b1a1e083a35948d51ec32ea5910943b9ba31383db10224eab3f63e9e17a935d99903045a361809d56fa5cdc021882bfac2bc91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    d6e38a633922ff828fa843d44d29b934

    SHA1

    57ba5486fa95cdfccadafbe7d9b56431feb19247

    SHA256

    1bf2605270579fdbc16cd12b26ebef25dd875741caf285009913c137fe3e2cb7

    SHA512

    96900259a6d5dce623c9e50c2a9441b003e772016dbaa4d2517866b23112c978d2d520f65ffb20df058508fb9626aea971d9edd117835a7f019f0382b4403fdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\2RY1Q2RM.cookie

    Filesize

    241B

    MD5

    8e1cd5f30ce39abebef53bfb472c223a

    SHA1

    36d5c5ae7d931561812e6ff5e4fc2850191e5b66

    SHA256

    79c9c469d9d58a81737cfc25e2af5821ece66f351f719e3af037ef74f3a7d1da

    SHA512

    7b4e4e1b8bc54a93c4c6be9b2400e5f466d057e8db4c401a50918a03465b571a14e407fa72f05ce20e30cdfaab06c477207782ac1b8d920f2229a7c2da1d5e7d

  • C:\Users\Admin\AppData\Local\Temp\Kno8458.tmp

    Filesize

    88KB

    MD5

    002d5646771d31d1e7c57990cc020150

    SHA1

    a28ec731f9106c252f313cca349a68ef94ee3de9

    SHA256

    1e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f

    SHA512

    689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6