Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 17:17

General

  • Target

    4.html

  • Size

    5KB

  • MD5

    ea47b888fcff3909ac3cbce4a5b18f31

  • SHA1

    2dfcca3efc5cdad9f52a14fb5d972b40a989b643

  • SHA256

    c3ecd752b7da83a350ee4d7fcfda2f697405006004206e5bd10ffc738b45b0b2

  • SHA512

    f291dde1e52ecc6ed6c2766bcfbfe337cd8f7d97dd634093f46469859fd8c51c546431aa71321cb4abd9ebb5642aa940e394c9b11ac64a93b0601b84e94478ed

  • SSDEEP

    96:kRfRITHfEP0jWTA1EkcxG8ktRlyDEMAhBa8kVJK9F6nb4hPQGh/hBATSBvkYqPHi:12HEj8PFJjGXS/QWi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4c283c3dbdfeb5579174785bdfc855e

    SHA1

    29254662252ae9173ca995003e6a7512c2e3446f

    SHA256

    a5380271a20e4e3be045a23f663e1a03856d1ab954d56821638f6004b9014cb0

    SHA512

    8c5bdb6927c3a6fd31e26d811e2ea3f3f6ab3533f8f664326ddc7918c6ad75efe8ff19c7df0db833cc7e8c97c1744c2120872b8b11102e0434babd893e600dad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72e13f118199f10d2f844af7b139e627

    SHA1

    b6ada1144ff7c5e42565d9b98b5b3a64051ae461

    SHA256

    303536eaf2a642b82f9aa4c99027e19a172b3ba74d30be6167c71a8d68ae729d

    SHA512

    da1dc6c9173300cb1efb2dc6b5d0ff955ff1f2031d936773df676317da2725d8893f09351a4ab0e37d5861eb9b3a3995be6cef6595092944173eff8ae713b9eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    262a17990cb6140710b777bf562fe615

    SHA1

    cc82b9526005f1c8d592a2184ca21d0d5dd0ad58

    SHA256

    3006881fc5b334376fbcbfe8fdd1c683c4ee96bbb752e7b3401d2b8768bc988f

    SHA512

    1e1a9e0544d81d97f6e41ea6c8786e7f111cf36a27fea04ebc67cc1ca94acaafa8a679ba85588a5411b2a973d436c795b1a3c89d71b1d9a2a8c763cd4ed63452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70f3fc40074241d165e146d3756ca3fe

    SHA1

    4aa87218c713e0ef337489d581a772557b9fc1d9

    SHA256

    97051f01722dc31572fc9c7e052da74a7bcc3e58673b72766ca348ea275b30f1

    SHA512

    3ed610d7637abb7374bcb3b9c835f0634da5a9c003507e34b40733eaddc6fdacb006bc0cb5c1fd8e35c69c7ff7b50e34c76c06491672bfd13d72d0e85c4eba30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2cd6bdc3865c31e747649d88d5059d34

    SHA1

    88de8e01afe059d7a087b4956d7d3c5f90d5c9ba

    SHA256

    35068bb8f0e0d9e36899f72b0e7e8a817189f5a84591b53b0df15b02557a2fba

    SHA512

    98ef834ff2c0315320e4c9dcdd1188f777357d793ba27ac2d36174e683de88fd0c9df12575be7015faa54cf6cdb6404bc9a8c2db193ba2be76648932016e4d35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70a58b95b1abed6b1f4d797df6fbd0a0

    SHA1

    9792c22781255a369a4fc111fc7aeee68be8efcd

    SHA256

    b07366b4df910532bddff4396928f9fb685cbc583a5f73205ebee7617a34298a

    SHA512

    4291d086d1766d82fe5d67d56e31ca3e2c9d31be926db7667ef664f005100daf15357833860dddbfd6236b4308e5b85d89aefddfad91aab200e2f232a2fbd742

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8e5238b5625575f5c0c6278dd239e11

    SHA1

    1b8cba5ac2548e09ab8ce6b46edd9d47fd082e3f

    SHA256

    50c0e91d85e72f6460249e68467356d097ba3c8cab46cd15614940d16e457b44

    SHA512

    00ba8835eeaa757e6e42ac52fbeb12b09334840b99a6b7b5a17ec5925ab03843c42c754291330ac961bbe4c3c0e3bb647f4b52b71bb725ed85d53ce2c78ea7e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53aec7d4f34f1bd2c846567624056ea0

    SHA1

    422b625926b7ca95f965103315f4b193bfb79cdb

    SHA256

    a204b1be37e7d00e196b6cc60454b416e5f59123a8818c9d62dcb16c32444610

    SHA512

    a9c30349dcd98d6261683bdb3989e38062e57808b4166ca15bec3068702fd43cc4ef2b1401ee9b540e2c2d59a5265b15a56802eee024b6706c8720fcca7eec12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6f4813f47935cf2bd2e59e1db57b659

    SHA1

    938c0b48561e186914031cdbdead43ffd974bdab

    SHA256

    58508cb988a132cc1cbf22255038eaf5ed7def1c8d7767dc6e0e2abed684ad73

    SHA512

    40248b1f0357870d6fa2669172b2825389aa27b783f07fbbca8e78bef997366aded5a442e6786ac01c9f22a0c2012eadb948f26dda6025187b8a056d0a41e040

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0074415e19ab46af963ed650f5a0222

    SHA1

    9d8498a3e55154470c555245d86e60c13766ec9b

    SHA256

    10fa795371dc7d80760bd15dd00705d70210d34fa83addecda83fd40e72fdcc8

    SHA512

    25ec05fc92637f7e889f76d732678b2ab6ff930380d1998ff878131f9d19eb1ac9198a1ee8d5a5e92e122dca54a7bbf122535fbcf24175151d0cfa0a8b5eff22

  • C:\Users\Admin\AppData\Local\Temp\Cab9E55.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar9EA6.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf