Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2023, 22:43

General

  • Target

    webview_error.html

  • Size

    122B

  • MD5

    ae2a2ae9b611d16031478233a0dcb758

  • SHA1

    ff618df41e1c41e8a5e0a946ba2bc07b026f179e

  • SHA256

    a65e69fe5c448f5bbaf2c8a6f2ea2d4cd4afda007bf869b4c2d970de668128f4

  • SHA512

    b414d8d06cd8f508d44ba0912e6358cebb6abd3184dd809deafb425f68acb071f7aaa79431089596acef89db3fdbfc922083b8fa2aa4750ba14340826bcb4fb8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\webview_error.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d220c876e6fabc85276deb27da29a83d

    SHA1

    f6b50200e3f6eb7c2bfa03d3b29af883f31cacb8

    SHA256

    615332876d570110b42304655ae88db677af8ab2f730f4b0ad183797b349dd8d

    SHA512

    e64d27974958cac7a42245f668b2cb2f29ed3bb1d778d1fe6d68088a9bb6d69291e69b61d57d7cc98c662071e74b0b6412afc1103e948159642ded0c9048c080

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a97dbd4e193a95e8576c3d6571fdf4c

    SHA1

    0cfde413bf496454a07d018db9064fac82f4a87a

    SHA256

    9a7e4864335824ebcd213332f1bd1938fc02a0abf7e28a611e651e58aee3c539

    SHA512

    ac8da06c9aa969add413ac4ac2b80683c1e8887abc7b6bb3710ae9bfa6c766411760fbf5d0489c855d84b7682973b8cc86c99cc75035b648cee7a5f07fa1fe03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ff7444e3f28c0ffedd638070c8644ab

    SHA1

    e6dfa4bb62b6dfb6ad67bb768d2c31e8e4ebf9b7

    SHA256

    587107e9f26db801ce61b77fb38a05e24c4c10b3371af7d57a6a3775c141c08f

    SHA512

    9c0634ba12b955f2b5dd242b0ed154a329b1f18548e6989598f50252de1872fab89a59bcb0c54a5dda31f16212e86945176e39e42b61a87f691e7553d396c074

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d74b684df3247c71106b4db32fbd1e3

    SHA1

    19be934533868f5805f2afdb6bd88abdc8dd4b98

    SHA256

    9a6067d8ab989ea1bd879a3c44dac88b3026c28ada1cece7a9fd46464903ea52

    SHA512

    57a97dd5dc17c95da411fb160f9ae62f1401041938ee0ab0d55d0426c06b92b6671000a3243180dbe631200da23b63cc2f319695c5aafa72822ce4094cfb51b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61797930d636303188de687f2763eefc

    SHA1

    88c1737b44411ae671a461e9a671af50e6d191d2

    SHA256

    161db122dd0bbc7ad8ae9f604f70b6805be32ee162533fec9440753ff292972f

    SHA512

    7661abc51b56d674fa26c3fd052fc1b72f8404da247a11f32bcf805f8effce16c934475258cce3a5fa61d95ef1f1be799751fe2b7b4af8fa034c689ba59ffe58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10a1d6626861fc2b19cf51739d6f56da

    SHA1

    4f9433fe7d741d5d98c0ee2f6f2498e0aaa3d60c

    SHA256

    3ed3c907f35f25a8b0f5f94096391268ffda3e844963f96d1ca8982120d86404

    SHA512

    63e5b83c359e53b02b1d861458e719c58c6e7a480141e2b25ad7ac09c7aef0290d5cda37c5149223ec865ffaec32d2aff988440e57a82a1731c65fa73d93bf60

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab4915.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar4B6D.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QZ1KW8ZA.txt

    Filesize

    605B

    MD5

    5af9bad19c48799d9a5d49754725f188

    SHA1

    b89ca852f6fe42a3fe89b4c4202be46d9d13a04e

    SHA256

    e4189328b56fbb1765dc280f8e07227ab1e62e750b7bfd20efc7c46d0edfcb53

    SHA512

    a32fa62db26cc620dae8035d66ac0c063fa3f76850a0e2a86f48f4de62f7fee9e564e92503737c006af65c0006b06224d8b0b37331ea7f73126f7c35020517b8