Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 21:46

General

  • Target

    139cc52f5a15da47b300464625118b2f.html

  • Size

    2KB

  • MD5

    139cc52f5a15da47b300464625118b2f

  • SHA1

    e1da23fd2fb036ea5d3a72d6173398f654a1efb5

  • SHA256

    9546e63b1b3dbc53c63ca14f4490fa5eb3ddeb71383127b618897f75fb891d22

  • SHA512

    aa50c8f5829692aac59db61da007c00a0c3fe0d0c8031f4490cb8204fa4e66a11e3f2748ac805bbd9b2e55305665dbe0a34031384376830de0fd0fa38d40ae9c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\139cc52f5a15da47b300464625118b2f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1128 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4f64f788d587e540fe61578eea6e909

    SHA1

    bbd1b52a340a155e4817d39dc900ab40a6e3b1ab

    SHA256

    efadfe6832748f3895ba46b856c9c0ece119ff784a0c30973c5fcdc8c2bde6ff

    SHA512

    c73ce4f69cbe0b1cc6831e3e1e95f987e581c19e844a8a16a37c9e3d220e5001983028dfecf5b3d9dc4f39f776048be94e88e742fcd4715eeedb510536f93636

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    177f2ea73e86c2c57b5e6ada3dd840d5

    SHA1

    65029abd5e31297bbf7df19c3b6a282a26a47f59

    SHA256

    fb0345e838b1d45cc579136306a3560384a417d81cb72ecdd241ab8217c8452e

    SHA512

    eea537ee81acb274c8fb0c24a95a9bab96cfdb665b3f15a6db6764d4ff52396037681f50e4f3a18af9b77fc3cc3965be40481fc87e9cbcd0647e0aaa10a84c4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f0a3b8fda97e4debaf8ff0b7889f593

    SHA1

    8f82dc6daa0ba34bd5a4c876f3f72625db2fd16d

    SHA256

    04dcf7f37eefbd7b9fc53cda9a01c22370357325911db3ddc40df7a4f0c370e5

    SHA512

    33c29231e532acd939e13f8eedf31531cac2b37b27b903dcc37907aee1845865a49c693ed437b2626ec3a23286d3c922e0771dd5b9f1da2e3784e16a94b1a329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    533da07070ed3efdacd29f3fc88805c0

    SHA1

    0904262bc1cfe560e2122cc232cc432d7e007c0a

    SHA256

    2c1917b26c7c672ef0cdab5d905fa6b144f3c6c2767013b4be4732cc490ca965

    SHA512

    008eaddafc12908fd89e7d1f623449d772e652a8a89516a5a125ac6dc2fdd49b3cd0a8fb6f851caeb82ea3fb126c8840bee596fbd844e1d3d1ee689ae7df3e01

  • C:\Users\Admin\AppData\Local\Temp\Cab399A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d