Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 03:28

General

  • Target

    online.html

  • Size

    1KB

  • MD5

    6ee8ccd848c6b6db0cf9e594f6ae2b45

  • SHA1

    601d3b50cda62f978c520d5e18138e1c7b46655b

  • SHA256

    1cbaaba075ea7cd88c84cd42128ea0bbf314e545199099440e2b80ec32532565

  • SHA512

    03478a2f621bb6914ca03660cb3d1be266b8aea4fb25f2d38b492b430221b4ba1c1535ec5cb5d8d9dec3b6ff0f5a23db3428e07b1ce283515e168c24d5fe214a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\online.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1168 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    3a8f7562a19eb358f4f065fbd62bc2b7

    SHA1

    670da318553257ea1ea62f90471c51f9a5183c74

    SHA256

    18a194531c88ef18aa5d8f74fa481238b51607af8401946e37f3481c507f5b2e

    SHA512

    d2eb83a3accdcbd9f671b9cc2c08ffb90989d469266e67eaf1ade8f62e99de557ca089a0a24ac1e26e37faae40b8dd1523d258941e347c04f23fa7cc22b1e1f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    0305a8c7c99a8668aa043528118e5438

    SHA1

    6838d8f49555f40d7fe6a7a17caacaefcb7b33e1

    SHA256

    01104a7361457a4acf073cd3e892475515e4e8871b326cc9d234fec2942e031f

    SHA512

    1169eed4c9caa0d6691697033cbd6894fe1d964ff31295abff5e9dc7b7f3cf28797478a2b56c638658e378150945e170ac57bbbb860ebbae57999221bd711f49

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YF4PBZEL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee