Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2023, 07:09

General

  • Target

    email-html-2.html

  • Size

    17KB

  • MD5

    c494ec48e89c6356348ab288e710d55d

  • SHA1

    0562acb6b156bc22ab366dbf0e6b3164c6a24867

  • SHA256

    cfb9524d4eb426f26354bd9a07ed4471f000a5b496beff3157c8226653f4473f

  • SHA512

    a68f6005db9a704721dd08f2fbc858218a86f2fa90b1b46131fb94a864903e55c14bec7844215e9d68a99c5f9c870e11d6a92e081c0970f5dc6e0dbb41b60d1a

  • SSDEEP

    192:FzifcYu6vOLBiifEzg4BZPcNipvyg6vyoQp5xIoW41vBbSw4NruvGvkoi+f:Yv5vWYpZW6vBKuvgf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1832
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:17414 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    60fe01df86be2e5331b0cdbe86165686

    SHA1

    2a79f9713c3f192862ff80508062e64e8e0b29bd

    SHA256

    c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

    SHA512

    ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82287E58F13F4D2947B5C55D42C12231

    Filesize

    503B

    MD5

    bd2a7641de6d979ecf1cf615d396fbc9

    SHA1

    210aa34f44de3ba3c85bfb3ca3ca4ce540354356

    SHA256

    84edb9d31ce958fe0d5e4e40d9e29bc8d2ff5b8c3b40289ad4fab987b67a600d

    SHA512

    cf9bfedea85e289aba6662fe8e55917b2c263cde7d737f441cfaa969230c2881824c3082c30ae9f94aa503177b1fb9829c8c6beeed3b82454214b59d97b9bdc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    913cc8d3b5510d65c079bd92c0d17980

    SHA1

    4a8e588805e1ee5189f46de78cdbcbf0ac145992

    SHA256

    35a2c8ceca960f395adab26423ab9a8b19371ada82d091bafc93c71d314a2151

    SHA512

    f61f46b007852ae64ec0fb913eafec885ba109e34a328a5aea33e768b58590117f4162ff26101f2a4481a3a3c4472b0f7a13c90c1fa5151a0a968fab2f0f88d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82287E58F13F4D2947B5C55D42C12231

    Filesize

    548B

    MD5

    94e5bc89ff6e3663f5cdc88caa17e3a9

    SHA1

    d5947fc07dc4d6589b88f224dd1a5d8ca7c2811b

    SHA256

    664e83caa6cdb19183d7f3ae70e591474a590a7d542fc124f3cb72cebfcd4c86

    SHA512

    33a1457b8e501511a9dd5adaabd9bb6af49f65e9d2a5c35f95ee16f0f6ab2a6c7ec0e97b5c543f5a47ad49317a7fb5590746cd3094a0b98cb96b100ccbbf5662

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7T5CRMPS\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee