Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 16:50

General

  • Target

    069c8f5cfa37b4d65a4a033e3be7906f.html

  • Size

    10KB

  • MD5

    069c8f5cfa37b4d65a4a033e3be7906f

  • SHA1

    dcbe646389a26f95a1cb470daa1901094b18e027

  • SHA256

    91ef85741f3dbe905ecc7d79891f0855bb4a80e8a4f5af8393b6d0aae8017c73

  • SHA512

    aab7f67c80aa6dcc6cddf3afa2a88c3416f0e1cebcc2228959c3ec260269f51cc2c6c170b502c50d1ee050b8a0df54b7a1957754a6674b96cc14a505b53a2ed0

  • SSDEEP

    192:P8rXdM+Vun73bAg+ITNCmhk/DPQDtH7zSPMUPZLkY:Puun79BBzM

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\069c8f5cfa37b4d65a4a033e3be7906f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34cc19919766200f9d41a731c4a58d06

    SHA1

    ae51c7a81aca512dcb161f7ea2fd26220106641b

    SHA256

    ef50e5c741fea8429f0272e3531d9892355b0f96c7882cb1617f40bb133c1ea7

    SHA512

    8c1864fd88697991b0d0e92a3dd92a48d5d2ff0acd318cf4720397ab71f64d22e06ac2829a30e0c166d2f03b879056e6f69920f6207efc928b1fbf4fbfe55441

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52f697c5a5f8bdd5ebcd71bb078cfdee

    SHA1

    98b8ff5c0a95a8173b16f2f88dded9691d1e3f2b

    SHA256

    17b489a235371d671b8b58da7268f03f062396128f5f223d7fde817ef411e5d6

    SHA512

    0cd9d6f2d1e924982d43d1ee8033262a1b3be0ed7cb2b8189bf501c221c5f65a7fb2141c7ac1e533a32398289d1a32d58e6bd66f4d4395a0b60f5e61981ad125

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21739dcbd9977c85ccb67a957786cb54

    SHA1

    8a3e5c9c6dff3bdeba285359d0379a3774a675a3

    SHA256

    615ed8717c3577511f7d870205ef3a8964c0f3a5ee6c4a9c74b6ab1f95aa88d5

    SHA512

    f760c4fb088f7f3b9ee2d64e86ab193886ebaf4533f8808cafe7aa720b0384c2ae8cbbf280676923cb3091899dd26bdcfe67f930b74f9bf24d4126c27401e9ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d60d501591c757d83c052805037645ff

    SHA1

    2d473d57b8b58f74c6732654511c0b8e32105e64

    SHA256

    d44f9f567ed7faea5d6e996a3f2b9c3542361ca398e8509b0bdf9cd3797ae23c

    SHA512

    8169772f2a9fbbf6c86a1076ce9904cdf8d0b84c2586f9b13680802ae9e21262dcf356ef39c760b60e395f70fc4e0db31a8c5d83a58ac0d802a72ffcb813ba94

  • C:\Users\Admin\AppData\Local\Temp\Cab9926.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9A32.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06