Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/12/2023, 03:22

General

  • Target

    RC7/Monaco.html

  • Size

    6KB

  • MD5

    fc63d6f8cfd66d984df8e003cd30ce4c

  • SHA1

    767beb1b385f89ef98d6aab11abacc564fc3c2b7

  • SHA256

    aaf84c7789f9f4a7505c408e484d0d04a5ddfe2badd3973acd41bf2e6a2bfbf5

  • SHA512

    843bb9660de5827a28a94799c4b745bc2c1c56db72d36b989ea2b72a3868d0b68fac36b5e320293e26034e4d2b0f9b0946162ea2f4b8e919131d888a825e5101

  • SSDEEP

    192:Q3+OKFLvkJj7gpk32eynKZyt7TJPAqkvKU3LI+QrzZws:Y+OKFK3gi32eynAhs

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RC7\Monaco.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5056 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    c09fefefce46928daf984d8d92282888

    SHA1

    2215ea778c3fb9036966beb80058c9f82e7bb4b9

    SHA256

    cf77d54731f0f96cb9eb9069bdc6b9f549c1384736c5d30cd55fa0382b13df4c

    SHA512

    9d19fcd375b4c505b1e625cc4b030aab24a6d107738ba0dbc487ef9ee71414475f110fe12762b42cb53ccf1132b25cb8df07d9b644b57e443454100227d11d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    bbd5c8bf63146037e9a165d089634879

    SHA1

    5d97630a82fea3cc8353cc0c33f58c5466b9eebe

    SHA256

    7adbb5f0d719ecdfc88c42b65c4afe62ef92444262cb82afa1adbabbafd5156a

    SHA512

    105bd7e6d286511822f7a83d9c2ebc945c0bf799c0d5facda80d2e2219e1198efd115e27eb07bb5581f29b5acc0d9b7d16214a8b414407e0c61288663dc6557f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver20B2.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W67BKC2B\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\21G28E2E.cookie

    Filesize

    540B

    MD5

    ae8e18fbfb5df9a8e70c79a5361fca8b

    SHA1

    5fd46b2aef05ee740b2932bc3362fb49d5847db0

    SHA256

    fefc43677f82d439594bd52336049bfc7b7ffb3812ca1c2e213b50e09337d189

    SHA512

    9821e6aa149e0026e62f5be09911dd1bcc1207b7d807f4f8ca6da1454ad6199b405cbb29474dfe46854f35ed66d6910dd98bd7042de2511ea9a3512911be2c41

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JAM9EJZY.cookie

    Filesize

    541B

    MD5

    0d8fab4760fc1d1d6bf6ea45f9fbe063

    SHA1

    53493f0a11211c26cf7f0c0eb301d0babf543359

    SHA256

    c6f182765c5b0640d4346ef8b44cb3297f1426f7a0c449a3fcaeee9c5d4305d9

    SHA512

    f77a74512658f3c0a8194f1f73194573995c546eebb648a9db097d2bfd7c76f49d06964a278c9ace6aa1adac5a47b9052db809cd396464d282b70c175cfc649c