Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 13:57

General

  • Target

    Bv9ARM.html

  • Size

    27KB

  • MD5

    9fb43d596a1c9b5b4b102904dbeb9b51

  • SHA1

    929f0a62873d1e43d6b3c428dc01c95c477f11ec

  • SHA256

    65d3e0aa7ada34f484c6c64b2a97037dcb7db50a343dcdfb70e2c9cb391cc98c

  • SHA512

    b02c284d136ad138b9b6cfe2cdcdb16a2a31b82a9471aa054620aa12fe384c267b6856dcc216b7b8f97abca44526e69e72324461ac8ba4d65228f95c4104f7d0

  • SSDEEP

    192:nyvOH6HpNSpAw+IGWG9jj/r+jDQYeElupe5EQ0CalfqLTHFVn6DNgANma1dy8DHi:nyvOaJYH+IfGtV1ej0zHTy8DHa3J

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cccf1a3349fea65174ffc2ba05056ba4

    SHA1

    c803443f99754394a933f357da6d05005fa28134

    SHA256

    4129ed2bf57ceef2df5e62530af490732618d87f6f2176decc7931d76694bf22

    SHA512

    d47342453733d4600144a9a5644003c5af4354694828c6c47e1ba8bbd811290197f190c2c8798b7ac457b8d0dcf301cb023510a53e9b8fc1f6389fb49adeb6f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f39028f730ec91418056f5450bac45b

    SHA1

    c314ea64e12c46fdeefc5849a9ac8970e9284632

    SHA256

    dfd2418039782eaae1b4b020751896f7aa655e9a1ca68eb971a341d1f4c13cf6

    SHA512

    3c06916d658362a9302c8efedb6d0fcad01d6c786371ec62b02b4080dd3d444bd8af89ab3c703205380d2f54adcbf7fb3666f6c1ae7b27fc42105f344887c19f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03ec56b4d257a0efe639d2c74e5c84d4

    SHA1

    801481451694e90d6cc1b06d31813ea3aaa992bc

    SHA256

    63e2944c7d4a4bec701e91a97415649dda7ecadd8522dfeb83bebf5b9ff66ddf

    SHA512

    72d88f3994584c02398f702151afc26fa49b05bf6539c43b5e2dbe240c2043335d6491d76c7b5806596297ef07c9de147f909f98c285f1a6edda1b1d132a6c9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1052539fdc3ecd33d60e3542b816d72

    SHA1

    e2d6344c5cc34e1b444fa0b4803611a70c9136c3

    SHA256

    97de6545fe262d963c216f63cc052ba3fbfe3be8acf04083a15bb2bcf04f470c

    SHA512

    d62135e7cf73f02fe2f2761216f46736cf2034804c8b232df5030dd1a4af814370e6ba98e4a8b016424d2e3891db9d7c74b512420d8f48f8e3f591661caca9d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4fd190be6279988bfd08f23e517531aa

    SHA1

    87a9b597df10e0c53b266a10e48b71260973c6c2

    SHA256

    71d84c5e2418175775d19d0c67e73f7242d44c7df462a2054ce99a3910f081e3

    SHA512

    f727e4fe92e36738463715a3e4710bb245959a2967f1d0b481a1da964570e547acf367d84a51d6c26c3f44b5a11bb87fce605b999a05b72ee26f1f17d95a7f5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c67a42625ffea398b15993b1a88718e

    SHA1

    ba94e35d6747162e4494ff64cab88a245a099e1f

    SHA256

    a57f250bc244c32d9b0be594f401b94ab5619f5e7bde4fe4a18fb926151fbe3b

    SHA512

    dcf18299e008a4f90c71e07026a236860c20a9c6f12e003ae8d7dff0d463e1b79fa87b4ca32dae665e3e39dd6c877f065b0b26becfc209c5f249892224f2a00b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be5adda3c8f45a31ad5f3bbb098b43b5

    SHA1

    90de7c0b704c7f133c57093a6ebe8d3fa5c7677c

    SHA256

    2c8e445577a23011968372899db3de206aca53939fbee6bcd53f71636cb87985

    SHA512

    e334194758d934d7cf811c6de613907ea4762e154dad1b25db110f00f7b96f816b28d026fcac1ecb726081ac64a28d6a809dd2b4f9c07a11ef9e053fef85ec60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1ac25910614864c5e65a3c1c01695db

    SHA1

    ed9dbfe2e1545edf45746c975fd049458c7e835e

    SHA256

    ed7c6408edbce97a4039c8b4ffcdb524a18aa9317b62607a7a0160654f949e97

    SHA512

    d8f4ae3e791ae91c01ad71acb35aeb4dafe7b76471f8576ddfd1ae8a45879ce4388d29b9ac683e677be66ad2876d16e0420729f0e3867af0fa529888ce916044

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ac2e423da79bd4f44fd543e911b9136

    SHA1

    caa02f05fc7b1f831a3db828ec1575b9d24f7d24

    SHA256

    d2d895b2fb2d605d1dd95c091f012f406c26e2ca8bce1644a44ebcb8225a3262

    SHA512

    a53a12fab05b2733d55f6426cb5f657c97fc0fae4369144b153255726d8cc7e1f40be2e5ef60292c39e28d72ae4836df0c1f5535176ce6089c6952dbc4d7a3cf

  • C:\Users\Admin\AppData\Local\Temp\Cab801B.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar804D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf