Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2023, 15:01

General

  • Target

    https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=Category&lg=2&tar=TGT&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=https://r20.rs6.net/tn.jsp?f=001vmeGwuYuhdeaKOsIQK3OvkpL5524d-BRDNf9hUDZbu2w97HE5zuA7iX1C-o1oLveQDwWYRVHqVbKa8vQ4FzxAF5a3EEcnXq5SoBLpEgvgtEmuzoi8my4X-bPGe7uvpoa2I0eojj5mZ0XkS1BNvfop7bgHgpNFznB&c=S9yfuO76AYxLFNDOGEUllys8ugcXmbp24YxrhMoPIes17CeSa1yJYQ===&__=/qwer/c2FsamFsb3VkQGhpa21hLmNvbQ==

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=Category&lg=2&tar=TGT&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=https://r20.rs6.net/tn.jsp?f=001vmeGwuYuhdeaKOsIQK3OvkpL5524d-BRDNf9hUDZbu2w97HE5zuA7iX1C-o1oLveQDwWYRVHqVbKa8vQ4FzxAF5a3EEcnXq5SoBLpEgvgtEmuzoi8my4X-bPGe7uvpoa2I0eojj5mZ0XkS1BNvfop7bgHgpNFznB&c=S9yfuO76AYxLFNDOGEUllys8ugcXmbp24YxrhMoPIes17CeSa1yJYQ===&__=/qwer/c2FsamFsb3VkQGhpa21hLmNvbQ==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads