Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/10/2023, 04:48

General

  • Target

    77ab678e418e10aef84565b78e75d64a78e390522e6169cbaaaec98b5fb433aa.html

  • Size

    398KB

  • MD5

    9c6c1ed9978b387c3ad37cd0bd164a57

  • SHA1

    f3b070dd3bf124abf799e70348b2ca091179e384

  • SHA256

    77ab678e418e10aef84565b78e75d64a78e390522e6169cbaaaec98b5fb433aa

  • SHA512

    d919f1c1a7b7a2c785efafcccc5d9ee632b4133ac52e12e480e84caacc5cde1646169c5871047c84d83bc77f05a97bab61780b772b56bedb0dd1e0c275e0e44c

  • SSDEEP

    6144:WAgcXSuXnkZi7Gyh+yq5hWxIOOQXxTwSAb:7gcXSuXnkZi7Gyh+yq5hWxIOOQJwRb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77ab678e418e10aef84565b78e75d64a78e390522e6169cbaaaec98b5fb433aa.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4780 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    6c1f78f77d25daccd90fb3b908335fe3

    SHA1

    f0a519809524325206a964643fce32eed779195c

    SHA256

    be2f0ac4fd670d7f9d4885d4729517e81219d6e8dc267fbe184511af5fc26eb9

    SHA512

    338b9e86622e6e4d4a9c4943cf911c06a2d4fe3ed087a2eab0fcd968d0144b31f0c3a7b84f0c4a358acc6a2eb3eb5e8356c2ffe6c80a19f7be73474084afe656

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    338B

    MD5

    cc5d185a4c848fc2886da60d36de7121

    SHA1

    af124f7a4b8a4f0120aece4eb18388619e4c85ca

    SHA256

    48889487724daf1928627ffcecb598dc7ce3871e8b01936a9493bc3768d6676c

    SHA512

    62ffc0e60a885faa83c85e7f4bbb1348f6b2278b58165611485c34e740d5526be36f51966b2611ce1a137ee1e5208a295b729faf38659158aec8585248095be0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    aff079e0618e64717f537fe20f487b03

    SHA1

    ec84f88a7dc9afe001f1a0fb5789d3a9b88ff544

    SHA256

    7973382d0f065ba8d99dd59b9e44f4264dad169df743d30c1cd9fc7e16ed3ec5

    SHA512

    6f81caf9a6a6256111cc2ec35216e906a816e7924b22afe0f6e88410071dec567a838ad059112a945fa47dcb92249e77ec7f46d7ec140d74124ce8c5c77dcbdf

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verEC1.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8466FDB4\likes.7965f6735e8e39fbbe73[1].css

    Filesize

    554B

    MD5

    d11928ebd8a1101a2d6b4476ad292606

    SHA1

    e369a7d65299feb97d8c11525d8c831cc463c63f

    SHA256

    7bab9c45d7c84255c431ca155530532d5ea19f30bcb389db20f7edf26a5cd43b

    SHA512

    f3999089fdd2719f70bc2999b1b282452add77eae62c4c55777ccb376bd0d0a3a738e2492301a9816df4885f2693fe47a9539a31ff47a445b2c86a1b8a6cafa1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FKMV2AI3\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LP91CVU2.cookie

    Filesize

    542B

    MD5

    f0573fe131c6c4fcf3f7923e85f6ebe3

    SHA1

    14edb35f22f1e04a307b21856b617c5f4d50328e

    SHA256

    4d0b8c32430d41b5fe2d5bab7636165888f23067dbc4e65a784df888321475a3

    SHA512

    39ca20803e17c8fd60090e895ab943817ad2bc4469459cd692a5fe974b8afeb812b9f78baf84facd99fb4ddc28ec3b40824f9a3bc958c0da14d1054cf44e3bdf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QVDITNFU.cookie

    Filesize

    541B

    MD5

    687f14631e5281087f7b31003206e409

    SHA1

    146933fb8f5e7e0100212f2651c2736ba8257e36

    SHA256

    e2c8a5055331c1da956a0f2a9fb3c5ab842e23ced5f2f96b9ea2ea7314ffb844

    SHA512

    35607218aecdd2dd59af285c5e59dfebd6adc7729df47615a676b5f54fe182e94d4f8673f3928e246b9fc49872aeda86b668e8805c71f81a13e4e52cd44f8736