Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    11s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 14:57

General

  • Target

    d0b014d303d393d70ae38b932208f7fe.html

  • Size

    601B

  • MD5

    d0b014d303d393d70ae38b932208f7fe

  • SHA1

    c25ed407c56de8fea0a48d9ded3ab0c6aa46052b

  • SHA256

    95c0e34ff5736cdea57cbe14f64f3cbb1a84747b730458711b4bd2a0f8250bd5

  • SHA512

    942b08b0bb31603f3dbe44945a64664af395fc337cb27c070a994a1e33cd7cd92c08629d8eef624c50388f771c4e89358a3fbde2c1135efe8c91faee691436ce

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1080
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0b014d303d393d70ae38b932208f7fe.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77fe8e0e4f91a1adb6e4daf6be9f95a6

    SHA1

    0a1c1011e08ab39b5daf4efefee3fa28359a3e1d

    SHA256

    be26cc856bc863a4200e93c9332fbd1305235ff3dc0396afbd46968b40c842c9

    SHA512

    7ba1e077801627fe5f2baccfe1d11d5ff393eab415a866dfa9cc98a6f674e96bfda1fd9752fb1747e07b3c05e42ebb20edd239487cb7601fc928fabaec07b910

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a47a67f7370453f2cf7cf7e52ac41cf0

    SHA1

    d57676c3bb8c920d1ecd24d2e8b90762c939646c

    SHA256

    430e169425f78219fa0b8796f6eb9582c8707b1ed0977aa883794bfffed73a13

    SHA512

    27d86b736cb718bed741d510e6c7e962e82402727a9e22f7d13a40c9f13e4a3e3ab0db03aed82bda679f20785e1b6ee4b96f5261735e019d787dd712036d2b3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b6ae006fcd482371e82b7f70fe93665

    SHA1

    82a045bc0753c33202f2d36e1ad44bdf834224ea

    SHA256

    d631f9947f30a4973b868fa129571be3011cc05cb1b9d0dfc2d509c217dc9789

    SHA512

    5cd753290dac8363703a46e330602c066cd9c42ca02fa025f3d065c35173a736bee33308a9edac97bb28e114263f727554f6415da8aaf78725301f366614afc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fe7c524d88984a519b4e284d65dcbfc

    SHA1

    746258f5217ec27ddd2d17122a876bef928f97ea

    SHA256

    d71360fcd7db75a998311839c66386c5fabf2078aae22dba373aa76e6e2cda5e

    SHA512

    42f5fc108400772397b4b29321d3cc55597b00fb5d1912574805c23932cd021b8aa78dcc1143010acc952ec31ae45c4ad59e587a1722dce0a87806fa4dd81029

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c774592a0dd85b4b8c8ef36b9cf8271

    SHA1

    4b586d6d63c58fc0a714b2ee2c6e54592420d52b

    SHA256

    e9bd3d272308a9fca87b41eba30d57e19fcf997e50dafe93fe4af26235a04aa7

    SHA512

    f1b906153838ed18c4500c49d4de6e13efa92dc21d51db58dd24da5a773366a75edcafe93f2b11f748b5652c3abf3a5be46719df715cd5607740f715a1170972

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c65aa0fc5bd0d026d821015d8060f0f4

    SHA1

    25d5170074e0e82a2454ca0ec7ab6f6bc864ee2a

    SHA256

    db37246885836ba9b4ce8b8422a50b0f18a3a14595104e8510330b0dc03f592b

    SHA512

    dbaab4ccdb15593e7abff90a32286ac1571d995a44c4aece3c6600fc583529cbe39bce72eef0e0dcf432ac15318c090085d84013c0ed333b93d7ae044fd313e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee49a3f73431134ab3a6fc8b867b10dc

    SHA1

    09ea586835ab5952a8d91a5c7b66bcceb2c03510

    SHA256

    fba50e3abf45303dff4fa7ac32fcbf803b30cb10b008671070c26b919b6545ee

    SHA512

    efa695382736f9a250a99553be564eba75c3c31fdde37035bae2f4d7ec2091412699ae85bed1b9d78919cec68a2b7498d8228faffd19193b2be5579104544c02

  • C:\Users\Admin\AppData\Local\Temp\Cab22FD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar231F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06