Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 18:50

General

  • Target

    https://telegra.ph/roblox-bf-skript-05-22

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://telegra.ph/roblox-bf-skript-05-22
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3360 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1128
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3360 CREDAT:17414 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    ab67dc6a0fe44cad7003952e45a3f22d

    SHA1

    e803512a8dea6f66dfde4b414e3915d59eaac855

    SHA256

    df7796b037a6f6cc306a889493fd26015bf8d5be2b7e4ef88acab0c6994538cd

    SHA512

    b117a3682636a5f60cca3674c1935b89e38970f58ca8841ee24dd6d2e7f4e452ef0ede82190ead1c180b948cfeb1fdbcbda1df68582b03030fca0cbafdedab7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    82b6e24e9d7fe90d647b5b81389401b3

    SHA1

    51f3af35027bc77cf6912e6dd3d6cc3289c19c55

    SHA256

    3483fda8fbc0fa1d77780c1c46e372c3bc834a45b19d149d0dbc8c2fba26322d

    SHA512

    3454b31c7111bdc0cf6ec133ef1dd6755abf0b006f77341b904fbb8ad25a81b548accc510f1590c2a3955f5bf86f8b023404e1acb9d2b028bb29067848936f7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    416B

    MD5

    fb284c049f0ec794b384cb0b3f05cbdc

    SHA1

    ef582a7e32545624e10126266e18645d0c9f859c

    SHA256

    7f0ee72d6b1db8f5d0a3bdc372a34ccfae5c57d169f9940f974d92ccce597526

    SHA512

    63b0e5170408fe2c2fda6f8feda8ef296d49492d04816d1e5a6f5be67d2d211856299ea590457f38a09ba7ebd2ce78a9c89b844be67f34d39219e45d41c08ef0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    d928824733511be225fdf15c5d855e94

    SHA1

    edcf6baca3cc7a5ed0de9de726ab2c1235d4b316

    SHA256

    08749352467de2ec2bf59c69d0943b52d2b04065e7d1082575382e3e0f79341c

    SHA512

    ffe1ca3b26ee4065dc727e19d45efbc6e5dd6bfa2f199040f710682b1fcfbe2ecf23c4816573fd544213e10b70b9281984f3ca354f56122b50369add761f2451

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    290B

    MD5

    3de774e289aac248cbcca825410214eb

    SHA1

    57d1bcc07a008b6156f00e5c8a13904fe0ae9e19

    SHA256

    e165fc042f6d45509a0f95c77d0c206c7f7b2fc662aed1127f739a827b844a91

    SHA512

    cdbe60a022c8686dd69115beb67ec2bdf01a18eca3890b37674ba93ebcce797a1c7e305ccbef54a9f65eba517ecbda2a8472af14a80d76c75e50a00716e4da76

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    8KB

    MD5

    4e95e35293ec966f6b47d52dc2b1b584

    SHA1

    97ec5184337f3c57da4715baa1b84d57980b91f2

    SHA256

    23620d1f4ac4babdda61bdcf977a205e43870d0ae2229db8c1be16507184f511

    SHA512

    452c634e7d1d2b0af374761279cf5e1fb50524d21bb7dc8428cb47364c9dcd08f71b49f422a33fb5dbb902c219d905822a3b92515b092517a2b50dc2dac68e65

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\favicon[1].ico

    Filesize

    7KB

    MD5

    604adfb53677b5ca4f910ffb131b3e7c

    SHA1

    5f1a0fb4e4ad3707e591ce16352158263488ed70

    SHA256

    24638331466a52bb66f912090e7a9cc9e3df2236e39c187c9409104526b472b0

    SHA512

    35f618f42adfee6d1335c67f729c298789419fe2930371a91683f60481794488dfaf15b572e6fc1be70833ef12dfe57432725f6336b6b73dcfb52596f57f30a5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\favicon[1].png

    Filesize

    166B

    MD5

    91169aa7638bd8b8d898dadc4d0d0dd9

    SHA1

    817e5c6bb48ea41ac6eb061c70ab1e895f294239

    SHA256

    2f2f4f03b4f5bacdde4c08482b99d0a4e418c280c6c1ada8c724b3a48e24609f

    SHA512

    bdef44ce6ab197f022b75534fe40a9a40a29cc451523dd0f2d134740726ee0f9f87d5ec363d49c279e5e56c19fd70d944e84d21f07315e4cd2babd71581e7c7c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee