Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2023, 01:04

General

  • Target

    editor2.html

  • Size

    1KB

  • MD5

    61acf4db8b548c19e08747c08084841d

  • SHA1

    3dc7cb72926c328ce56b1217ba80492332483ee0

  • SHA256

    f2d90c2f69452662f51c51697a35ddd5eb42c4ea0fd1ae1445a3ea442528d282

  • SHA512

    1a66c9d45ec59c586a270e406a160a45afc14c471ca2d8fb8dbfb4527d342981f3e148d8ef4a05f25f513979794579985b3564923924da0645a04822a178cea7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\editor2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bce84b2153769ecf0e811b2e39b1d068

    SHA1

    3215db7661a76dacb684cbe5ba10d5c419834669

    SHA256

    58d004b9239a8abe5a96a401a8c3ebe9ff07c0458fccd0ccf46099901e68a00c

    SHA512

    12ae2bc082fcb74569152224c1791408dfeb038e4c213654d8f93f24735b853455e897982e06b4259978ae7ae1c32d99586653a42a18831ba39225d824b30b19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54329c2d49d808c0e0e14d2f31618d91

    SHA1

    f82d0479bc257d4deff2a64863dd0ef7f657399d

    SHA256

    4da31e02dafb0f444b987a92d74d25cdcc15e37f226509f2e6223ca916db85a0

    SHA512

    65169ac635a33990bb3544da81a7678c85bd33eff6c3a02ea6c7e3adb40d97fb13a83bc19f42735d880522d5bc5370a61514af98425114e345a9363be3afcb3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15728dbe9f9f9884e054dd2a88894745

    SHA1

    f9f374b7c5a3cb81cd3edf477021c3780b7db499

    SHA256

    c7f8d1599250c6e024861f3c33ee1b58cb744377593702aba2eb355c1217f590

    SHA512

    32ed07eb18f9b7a139999adb9f9856e2e5b8ee5502f57be736ebebeb77342d9ca9b40a54d702f54b22eac0269d15d21f5482af52f002bcd8900e606f4e91871b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0a8757898c0ddf67b43cc80c1bf06e2

    SHA1

    db381ad07453ecb6acba5c154c73427bebf51ed5

    SHA256

    fe1e637f684db2f7d56cf7e7883aac59ada8737aebcd02429cf58f92335a9e58

    SHA512

    1c68da2c621efc81142f2d320b789a14973f305909748ef37e86bd131539358b23da6336787d3e30c5b176e959383100fad05b051d62f2a1f24755d84a12f9d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c078fab8c78b8cb2255045bdc577ad61

    SHA1

    9a866fe82aacaa9c025e8bd77a4e18679925d516

    SHA256

    416ad85a1318bbec5e1b0881b55ebb2efd75e67bd44c1545be5232e5e8c0ff8e

    SHA512

    0221149608462a17a458ddb0bf706c7449b32e29b2f1d43cced79c26586848985c66d5eb5270feebc19fc61e28453cf8edbc3dea529ecc75deb3f456f799fec3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51c85b8904afb888432262367669dcf0

    SHA1

    48f070902bfdd91536ecb5cd81400d0e2d35db27

    SHA256

    807bfe148f0c57914b717b8378e24cf13e0561e722537608276a976791ae628a

    SHA512

    cbfc7da5c2caf3ad3b81e390b75e07127ae5f69d1c9118369a3ff4d1579b73050d9c05eb3c21c27b42dda2f3ee82d3978ae6dea1854dfaf10b6c53bf3c8b93ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13b6f47c1708a4b9bb3ba5ce7dd8c983

    SHA1

    1a489c5c19ed37ffbc55f86feceb6bec3d26132c

    SHA256

    992e9e8460c170b26d86abba9de4e259eefd173025fda059c951e554993e0c23

    SHA512

    3ba4453be4f986d783910f1801752a72b9bdf550b35efe42504882ebdd255e433231ce88c9127958a9398671aabfbc0fd84b747d60e4399c4599aa2f2922495c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQLKSAYN\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab623E.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar62B0.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PD5XTCCE.txt

    Filesize

    603B

    MD5

    cabbcb661f95b535126ca3b8a947fa20

    SHA1

    ec219ba54bb2867b4dbfb5891cf56c483b112cc4

    SHA256

    48adc67d59aefa5f0ab6c40e84a41da740c0286172bcd4ea489a54a3cb2c4476

    SHA512

    00ffa5847d6d718a6db7e889d5764a65639f6eb5472ae2812a457b50152bc0db7f285f46088d63a0cdc2ac8ed31a792579871cf3ae1a80f490751156402447ed