Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15/08/2023, 22:00

General

  • Target

    illegal_domain.html

  • Size

    5KB

  • MD5

    282bc362aefd810dd32fc3db205352a5

  • SHA1

    4907d358d07f4538a2867cb37ca9692b9c60b7da

  • SHA256

    69eeb53e42abf592cc44fbf68a1f5debb82135bfbb93afcbea156efd4d5d705e

  • SHA512

    cfb7b67aa6c25b284a5a4fa0f4a1c296e44c4da83f48825e871d69bfc72d4bb8adff8c555fd071ad9ebb5967861f539d1942bc60ce85e6776c7a9759d42a18e9

  • SSDEEP

    96:CJydFMTYoiSy7C8FMCK+vYQ05EAzq9yYqVxK7cv8HdCiciELPZdHnOy40dHu:CJ2uy7XFS4YQu/YyYqVxK7cEHdCicjPq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\illegal_domain.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c233fbc53ef753d6aea7efe3e4dcf569

    SHA1

    06cdba09f690fcc900ab16e01619f8e244eb421c

    SHA256

    2b657dc597d355dc9c77e4a796fbb3c8941c442cab6186f8aec18abac85fda90

    SHA512

    acc741111945a62db4b7b5457a9cd5c3a1a1f9c76b05938f764812ebd2972ea74973dad2880d21adb84f2845a10482ade61f05e4f1a0c1d80f714be4b5ba2048

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7f4a653705c9a15b7b5e312c99240ce

    SHA1

    5415cbc5a05465a7b426822670343b1c6ce049a4

    SHA256

    fdf561dc512e16de5699457e5f1d7d31f23a0a87450307bfbf409beed96fa538

    SHA512

    4186919eecd194557002c83ebefc3fa8ff406f2338aa349ddd5f41c18a69329665a08bad7039586c586040155b58b9ea05fa8b27bd7a4f7017bd9d80a24569c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b25df7673e1236ff242c4422ad947f39

    SHA1

    28e4aa29ce07bc16abbfb447d05ba842b32f56e8

    SHA256

    7b9d0ae520b8e8f2127945eceb2c02623a6c226ff4a28b3bad6fe3e209b6ffa0

    SHA512

    a9606433c5a8fe962435a1c75e9c62356ad5d3d0aabea233c94b7e627bcb380ca4530942bc64ecd1ec986eff88634113e979a4484d630c1c057f8301e7ea6c77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    564ee9cb68fcccd4b195e1686912375f

    SHA1

    0d506125c674bfee21608d19f06451b8a2e46f0f

    SHA256

    3ffd97610bc89b23077650cf91c2c44052333bbe315c10832b00208544b3214a

    SHA512

    715db08681d139fbb163e57bafe8a5cba4ce71d65d925847c19f4ea177cec1903cc44419b0fdc1df97f5bc31db0e0185a4f1ff301fbff5d16cf94e49cd719aaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20e6ffe730faa39ec67f7d95c54ba719

    SHA1

    94a476d11915f34f56cc1126fcc23ec3fd3da513

    SHA256

    1792c5e2436632ba7057632f3f9434562d0c2577836316f254b776c727efa824

    SHA512

    e9495503df66576e5c0649179e43bea746773f4d7aa3723bf766a9cdac9acfd14af18fec918e24b2848c451e01bd75db0657e090840f4cfbe79a6adf1452fa6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f945ec77fd44f4351d9795e63ec7b66

    SHA1

    3460c7660527942f6913d919af201f7d0b5a6249

    SHA256

    15d2150d0fec05d33cd823ffc9ba86df844759e410254a9e0b39766f0f708249

    SHA512

    5335fde81df5e6257b7487b3de5eebbc41c9cff0007ff4822b1294b4c04422c96cf1a343796a73dcb9390b68e383881595d11bcae572fe064cb98722e08bf429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db3c5614f8bf8e3793123daba5a46047

    SHA1

    1d255f4a33fc38841cbf0a1f8937bae67a5af5a2

    SHA256

    25b5ab89a48b857ba9b89d93eb38d3c7aabaafe74fd3a2adecffe876e88abc50

    SHA512

    e662d6a5652d35de96d40e6ead41954693f806122a1bd4c2eb4397ceba535c24f71f7ff7f35e5af4745f9cd7faf7d4c73f40eb16f82dd8b77c6aaaefd6dd0cc3

  • C:\Users\Admin\AppData\Local\Temp\CabE237.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE324.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27