Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 17:13

General

  • Target

    07c8204116253a1228ed8df27596bf95.html

  • Size

    6KB

  • MD5

    07c8204116253a1228ed8df27596bf95

  • SHA1

    312b23f2ca930bd690683465b8f59d1ea9780cb0

  • SHA256

    e1961c1792fca9d5b34a1d16e0840e909e12efe801a49b90e3825c67397f9a05

  • SHA512

    d1ed4c3504e67db3762ed7721150a878ed8c69ff3e412127f5e1cf0eb34439f340f7e8ba0c12a9009b8281086676ce3977f3dd0630f238925bdd68a0586277be

  • SSDEEP

    96:uzVs+ux70rXLLY1k9o84d12ef7CSTUs7cEZ7ru7f:csz70DAYS/Rb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07c8204116253a1228ed8df27596bf95.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c8987ce434a00b28be69d0c15e8f038

    SHA1

    327ec5766fa937c2828dec6151aee4026bc402d3

    SHA256

    26c414886a2a61ebe7f8adfc7287bef8110c31e97250f9ddde2a4b1b198cfba1

    SHA512

    eea9ab6746992f195221d6ad3f95b6b7673cdd2a4b155fb24eb37e5ee9198508a194ea80c2cab5d68b9482fd8f763ecfa3ce38cc39cb34a0e79e8ab5d6c38482

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e81f91375bf2dea5ec324780a056bfad

    SHA1

    82d9df4037dab35af9c118c7c1402068b67f4eca

    SHA256

    0c526b952c690e63374a5df9e1e78b60bc762c0370315b73f8b1b3559a8e21d2

    SHA512

    87d9de21e52381338c1c00de64f8681854d422287462cc838245364fe5ed21bb59ad3fb7cac3269ad44599cd603459eb31fcd41e6d14bc7bd60fb03fd15e1dd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dbc721dff6441cf8b7cd408962949762

    SHA1

    f52aa578d23992f522c8e68aa82af327eac13a20

    SHA256

    9328f96f008f0c2ffecd411a4083980fb73d45e3ad19b6e38c03bf35b3cfa2be

    SHA512

    331f76b6cddef17953359d0fb6c17f191960d7dba58e52c2d7beb447328d987481c3d3f39a8569d57782d74b5746cb357802de40af8320872862297cac1bcd30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    655e25f17211b5714e172eea3d322726

    SHA1

    78f57653f18f6331645409feb2e0a068cd9e8606

    SHA256

    fe4889711437ad54ab5c2c0e7339cf1419e8042e049919534cb2d728106c7bfd

    SHA512

    de57f9f640f30d58111a79817e8f77d76e57aadc52264a779760f39edcd8eb6b48cede01cc5938e3634c3efb52504b9fca48e260866f204c7655cc7be6f014fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab4d623320e798e66000097200db0fb8

    SHA1

    2b3296099a77c11b3a1afd2f12b5b732a42a7dfa

    SHA256

    17dac490d8d6b0a2bf8e5646647b06f480a7556f444018dc1efda7c9ff85778b

    SHA512

    2f3cd8102433917b395248c0df80c2003d07cbf47370bf2141aef35116b42c81d74e867bc1cf24b840d0cd2a768ebf20363e2fea21a699ba3d9a685a7e67900b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17f609fa57cb770b33cddf1ed689e23b

    SHA1

    3e7002571c8251ca7902174d4ada674bf1e8877f

    SHA256

    c3a62e9bd1fda9b8319609b22e45cd4d0732f1898c64817b965c4cb95e4a20ef

    SHA512

    214b65b6fea3301078f7cc9ccdf0fd357bb11d49d796fdcf9ebf53b684229da89289d7c5719cbf779bb780666afa9b6b7a27cdcc2827115b614a68558e0c242a

  • C:\Users\Admin\AppData\Local\Temp\CabA620.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB8AB.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06