Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:50

General

  • Target

    1712ec2b42d3c526ac1ee57eeddf32a1.html

  • Size

    10KB

  • MD5

    1712ec2b42d3c526ac1ee57eeddf32a1

  • SHA1

    568e053fb6493aab07c839a34b413e4312786c01

  • SHA256

    e8dc57b5fcd2f138a8f1618b9c61275bcf4f07429c3d27aacc88e9a808f462ce

  • SHA512

    4b7a6ae299c4cbf39ac112546223a1eb0961326a53a381d2c985d1630d6c34e6746f659d76ccafc0a90d06ef3b827c6da44e5cebd79e04255251ed4a39a650f6

  • SSDEEP

    96:uzVs+ux7cLLLY1k9o84d12ef7CSTU1GT/kRM1pbmhAPLlVHcEZ7ru7f:csz7cLAYS/cabmhAPLPHb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1712ec2b42d3c526ac1ee57eeddf32a1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:2
      2⤵
        PID:3008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab3C29.tmp

      Filesize

      44KB

      MD5

      9458dfb80e569586290ec85a8b0bda2d

      SHA1

      30205c9b884e01d6b5cf29d0023880fafd759d5f

      SHA256

      ef2012b03df866cff3ab32289846d06feed86c8d8389bfa9f0fb4dea4452ec09

      SHA512

      e77caa59c3b675d83ca999464bac34039b39d27e5217c718cdda118eb7fe68be211ccf0f8c9b3b061365643562406af2ab46e2a156509c26bb0e7f5ee8b6cb76

    • C:\Users\Admin\AppData\Local\Temp\Tar52A8.tmp

      Filesize

      20KB

      MD5

      b9f60443751df997e812eac1cd797ebe

      SHA1

      85053a1c3c5709b8a2fae10aca05f453741fa584

      SHA256

      51f1f1a9ff2ecf2d8598a90942812908fa39cdd91bd9a22e099715000d187cc9

      SHA512

      72142465907a50684c2ac50e7444efc7facccf387b7973912c79aeeddc39cff88831dd919d7e8fe379bc7c0ebec1afcfae232bfd5cfdbc210e680555e02c813d