Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:13

General

  • Target

    ec0bca3e2265d995abfe895276f721cc.html

  • Size

    48KB

  • MD5

    ec0bca3e2265d995abfe895276f721cc

  • SHA1

    e2b49c24270e8ee043bdd6bb72736915d6f623c6

  • SHA256

    1366634f6b638198f63e67e3c4407c1fcbd1dd708c9341921144ebb436fa2746

  • SHA512

    f37500a0b21eedc2a26a0d9550fa4ffda350136cd070e02692c7cc78df7db86b2351f35b675ef4ba0f42b5685ae1c19d208a7223c115953eafa13138c0c37f1e

  • SSDEEP

    1536:+IRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZIuv:tIuDicin9geAr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec0bca3e2265d995abfe895276f721cc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e87d9b3b1c4e0400e7db6bd5d43b137d

    SHA1

    b831d57695611552d3a32c260e2dad112cad06e4

    SHA256

    5f59cb49a0eb0f65fdcc82cb9644468e4b571e665c35b2dfa1365a87efe06fe9

    SHA512

    54d9a87b209c518bc1610fe3f9d4216c4486fd1fe684869cb53916e9f87989cf555e7fe4dd08e6b37e2ec4b40dd7bf5c02b31190d55f1dae62518f5917e65e0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bdf46af34aac507d5d6cf8960306c20a

    SHA1

    fa4972ceb44fc04640a382c00d31d427b5cc68e8

    SHA256

    37ef1f65603c7b83dc59d93a3f0dc139d1f3d200a66361bf9b9334e00462b54b

    SHA512

    ed2e42f13067a18588d1de85b2f83dfd840d57834ebd673a7b63a4d6b8a067b95ad7cfdff6cdd3a0e3d7c17d3158245f25fd3b4fa695dc0ef42b1b2b4d21fc23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ebfcae55704e21ccf1c3cfa57b42fec

    SHA1

    056021a095273920e2b9543419315dd42b376e89

    SHA256

    ddd41294d9102e8f0a5f7d35399c78acee2dc75806ed60fd6b56d835363e15b4

    SHA512

    28e0255060315973d7c2e6c1d5bab46c5b1cce5b4fe6cda713bd2577cdd89563ed7b417a46cdba01f299a53d9281e6cd7091522cba75d6e93ef4281fc08634af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79b696397a0987caea0035e6b09b90d5

    SHA1

    a5d6e14f47f10a70e5229b1e807c0ad811e8adf7

    SHA256

    4c111639f7c5458703d8643c0573361939e05cbd4e5382bc35c38e35e18ac32d

    SHA512

    842b8eb3d9626973fd4ef6c1afec85aeb9bba6041d5e1183d7ba50e949303284de6ceefec77d8085dceb2c6cc45e4d9f83c6e302661b58138be212d3574bf405

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cde26af81be7a2b0cbe16e3c2dd7d01f

    SHA1

    9a39ac6b49567a1ebde5ceb8b0678a96ab86ec62

    SHA256

    257a87024a994db98f1fb51f59749ce7bb844accb4bbcde2e4889265ec80bf70

    SHA512

    7566fe94690373dcc5aad2dcc03aaf5772b064035d1ea514e285bae17981e32eae562edb67b72e58a99cce4bafa11034ae03e7981b74e53ed29dc127d0073527

  • C:\Users\Admin\AppData\Local\Temp\CabC6F8.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarC7C6.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06