Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 14:07

General

  • Target

    Bv9ARM.ch05.html

  • Size

    6KB

  • MD5

    26d9c4ba0d0ba34152f7591836d57d67

  • SHA1

    ed19b576a35b82f50b02187cb070375742522b0e

  • SHA256

    f90eaa5b8e9bf114e843be20b3be79f2938bc3774a2209a3e4b560305bd092e7

  • SHA512

    be104ac17d040c26ff86d35312abe44cf6cf18858c43b6729bac991b3946b0f16c1441b579231740ff0167a10bac88ce09278b78fa4600ccd9e4d30a1aac1296

  • SSDEEP

    192:wyvOHU4cNSpnfiQSkKZHlyK6Qar08+jg4gY0:wyvO0vYks4H8Qi4C

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.ch05.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa76faf3ed1ac01b4e80251912cf1624

    SHA1

    7b25551fb20acf7e94b8ea11e3434bb0e813c89d

    SHA256

    5717882411c9c423201d57e91a82bbbefdf2d7d17bee92ba4dd8d61b3d68c5f2

    SHA512

    67163ac23e895ec15d916c5b7461e5032cacaf30db3bae071ec5cf25969eda4ee8dd36cc286c29ac0d8198eaa962ae3cdb4742e553dd012dac24810a08d3c66c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e80e649abc5fc7dbff1af2c54de2bec

    SHA1

    fe87136fbc3c0bc1cf6d0a430c08bfbc96162c1e

    SHA256

    dada408e171c253460f44c629978bd560ef1cc590f0d120366c429841a687d38

    SHA512

    e6f2470933a876675a605bdc3b1613eae3c89d59393bb6cc99d8d862803d41c337de8fbbb3857b3e8185c1e7dabdbde8acee3ceb5a96ac6d03d5b37cab9d4f19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76ee12c11813ee682f32e927ac17620a

    SHA1

    1ac465a5514fc570f3e248009390ccbcd7722741

    SHA256

    1f7d99d8d951e90e3e092a13a5a58c9d95da641fa2f7b4740afaab5e068171ec

    SHA512

    1434f4ccb65288d69f7d41b2c6d9700a7e8fa64ff99205dfcbaebeddcf1822575a68df25ef888882928791d284abeef4c015296d1f394964ebf10ae415e5bcc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1a8108838ef9ec65fadfd01134e140a

    SHA1

    2b6cca0783aa7f7efe890d28f97d5986c809290b

    SHA256

    a662d8b98491fd1febfb8c6362bf0544973500cbbc0343be3d2e1a15a7eb0ec2

    SHA512

    4b60de19901f1b412fba5f8af17f327d9e6edadccbb45962fd82c984378629a71d8aefdf2b9bc9230b5a2492ba7e052ee17bfb33e59684bf18346d8eff1ffd5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84c551f819d5dd2db8d905796fb25bce

    SHA1

    87e22fd16b262c0ee2618eb4ec832d96681a92d0

    SHA256

    91d92bb5b133ed3ae4414250cad717a80d4969213fdea1315a2fde7a58fb0c3b

    SHA512

    87de4814d462f7b90436212600d191109835c7772be0685021d9eee4729c0988cdb3867c76eea6d3d788c26a5135f9e80bf58d62ccb10b346a36459488957877

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1739a4722942f3ef02fd483d5fce2cd1

    SHA1

    dba3cd907f1f39c5221c565847af4c1ee344e95f

    SHA256

    a321877239a4249eef7028fde620f70cad03edeae3a74d0cb838c63e80309dea

    SHA512

    75f1871250c9148f6b963b3c2532d9905068289ed9b3ffe58697558a2c8876198ec8966d33c8d59841dff7c4b8fcc36d2178b944f297231c37465e84126165b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f89e661196465edda6b013ea101ab2f2

    SHA1

    b63c515672c4003ce541e27dc907978cc259244d

    SHA256

    a1f6ec2208d19a40ec2c36e93855f6bac95d54ad597dc471dd8624d34c0d23e3

    SHA512

    003f79832a047d91f964134ef173adc6460cf2919d003c95bc48ead6c582edb01e6486998e714f8811a816fe64de2af543c8231298ef3960275b3657fd60e138

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6b67f667b516b187b22b4705d7c01bb

    SHA1

    689830931418add78407cbd1aaff25ed155fa6e2

    SHA256

    44da423af46320b159a9a6d61d5ba58b77bdc6e105f336bb6cbbd64cd4c843f3

    SHA512

    3c2ebaac5c1b673ceb03066ef267aeb2a8828f2b0acdd7b3662798cb32dd2f8d12f5b415d2bc27c56837a4a5be7c4007436034dc06f63f21b1b1f6bd6a18cc6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3cfed2c30dde2bcc4d0883b1adcf185f

    SHA1

    b6292dc5bf99abbed07a14f2fe1767650f20ae5b

    SHA256

    1238a4ba771d815803b8c08de046e3103989c630e88c70bd07d674d064c48e54

    SHA512

    94c2f866fb37e76091a55a0be820ece69f39f632a6bf4499aa9d15ad0003c330d5fd7ad1975662dee3bf764a77a92f118abaebd99ef33ac0d4503e8e3cd39f83

  • C:\Users\Admin\AppData\Local\Temp\Cab5EC6.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar658D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf