Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    105s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2023, 13:16

General

  • Target

    0906fdce18accab1a010b4d7c4f9f4d7b99f5578293989481a06012424ac57d9.html

  • Size

    207B

  • MD5

    5ca041df2f6199357d60e29932f2d40a

  • SHA1

    f98a3dff29363da7ed8f7d90375c8c7377ab1e5e

  • SHA256

    0906fdce18accab1a010b4d7c4f9f4d7b99f5578293989481a06012424ac57d9

  • SHA512

    2fba702f118447818c883fda05505e6b991b085eecc4e974eed0aefdaad9b8526d0f15f5cbf05ed439523493012641071c98921174b65de5d17ba5e92a8439d1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0906fdce18accab1a010b4d7c4f9f4d7b99f5578293989481a06012424ac57d9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4252 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a244894fbc1ca90d08cff32fb6cd308d

    SHA1

    59e3c026c3d1bcd549f697b5dd4a35e298c9d2be

    SHA256

    a6b607b594b789a6ab1671c98fe9447509b82a85cfdcf4693b253616568e32ac

    SHA512

    b62e636d9d0e9e67ff310f3370ab1ca66abf93efef89a9a0d6d79e4526d8904a49b01f39ce64b76d3db03ac7080f62a84caabfbfc7bbf0244e2601457ca7e09e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    1a872c10843e4f8ff87dc90b4645c7b5

    SHA1

    fb647e1bdcdfff7d68e5d575b5faa2ad7a4e001f

    SHA256

    2b5fe32cb66c0cc06842b7509eec6adf7ca607de28348a56f67fac53dd195368

    SHA512

    abec9facdc1842b8d21c3fdfff9fb6a9d355b0a1d48978657b613f5493ff8a7a094e47d5cdf154d58bcaf25489fa1a336b02e003df0c77834cfd7a79e13c799e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee