Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:47

General

  • Target

    WindowBlinds/Diamond/NS_Shellstyle1.html

  • Size

    8KB

  • MD5

    6784b22ad0303de8ee5887af8a0cc056

  • SHA1

    543a8c2666a15e680e52e4a2b488047818c0aa25

  • SHA256

    eadb7aef346d6dcd8c0c13076add9a24ffcbab1438d598c22ea3777346d73299

  • SHA512

    5e683f4b3140785f17d95c07cc91e93261711a9570436cca3ebec29d11ba9c394d4b1f9359adf302ecee08d0e6ef5dbb3918f9e7b62e7f2c05b49bcb85990d04

  • SSDEEP

    96:VvgaVaIJG1UbLfFP9J7VMnKzsFzAGKB4OS7wFVOcDR1To1+JZAF/AG9OSSwrcE2A:VvgO5JG1uhl51ZxuTqogiuT8/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\WindowBlinds\Diamond\NS_Shellstyle1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b615035f5d8c50100e4c27f87a0003c0

    SHA1

    3239bfc816fdcd228752f7478f02e4aca495be49

    SHA256

    d2b8780b780112c1d00355770f0246d4cdb86bb14d6d0a2ef04bff1b2306116c

    SHA512

    02cdc9a68ef003b99d13eff576680cbde14fe840bd01ef9d6f74042586b94e4d5b1458e7e6fd576bff8293b962f4a63b8e21617f34613ca2c9d173b190edc030

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df0a7416801ec3460e6f5f0aebb4fd74

    SHA1

    86495da165cc128f9a506d93545712f9f599c153

    SHA256

    6db4766dafc0b1a1e43ae96e99986244724d6cee3201fb3cd0b4e76efe50dbd1

    SHA512

    f8cb1951621eae8efcab06784122e6b334d90c8092ec5a1d974b4bfdaea53bd84a4485b143c4745d229244b9b853bc79d1a52afb743efbeffb4b5a46a8bda722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1ed2ea1d035f89856aa03aad17bd1c8

    SHA1

    4e948125a56a942067e8eb0e72569ffdd7dfd5d9

    SHA256

    ad644a585422d147e2e7eed6c404046b9501c12cb2d41dc3dcc60d1bb5d02a06

    SHA512

    b8d97e4559cd8450d486cd90cd8430297c17eea0aac6d31a772bce3d21688de0a25bf1180ee0972c26cc38117fcae37121039dd136c79ac010ee74f1bc6d5263

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83245cc0c0a45050f41ab57739bb63e0

    SHA1

    c6ca62bca978a93e375b3a136d5868c2ac5b28c0

    SHA256

    872fa76d31cb70ff76a44def8c5ed74bb14a4608f24a24c22a9a3adf1a10ddf9

    SHA512

    12bbb7abbc6e8a81ecf90216b01dae6282f9f0f63f59530f9a44643e156ff2bb74c02698fc7a44db359449cf501b0ca9569d207a56ad0c7e9aec746628d6528c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22f953223a44feb7b8eb0b1db82763f1

    SHA1

    d2fdc1aee9b0535eb16899913f2c2a400e0e7566

    SHA256

    50ca62258fdb3393be37f88c5882f0aba62a23d3581c19a48850f77176fbae6d

    SHA512

    fe5f10824fbefa7fd07c6ae07a87772a415b8e9d49c3756081d6008e2fe5249754c27a9d007a7d538a367dc2cf9084255a9723902e70877c1ecc82880c117e50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c0facfbff8ed993e3b446ea14abc47d

    SHA1

    d7354cb33d2defdc405166f2d80987fa129d7319

    SHA256

    6e05313534733c2c62de314e4b808711d91cb1798f0f85be4b9dc62784ab03d7

    SHA512

    c93a17b88de340426fd3bd7df888fd505c244272c34b867e52d57447a596eec5e050b809ca3bd318284e93ed8e1bb1711d76d4be27b36f615899c4c5a15f2fdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd413b8976a66a1807227d88786bb22f

    SHA1

    fcfcb526c061174014d8f3c5a34e2efb22b26fda

    SHA256

    4f26d5d0bedfb3a3546ebbdc80502cb9b3e921a22b9f95c503a0d4b9b4a3ac55

    SHA512

    25d69262c7c92be3c5a376ac043c8af37127e1878d5ff0d3bbd10522549360ed0841dcd0a761ae17533ba04bf9a02e54463d73ea02a59f66ca0498224ffe8752

  • C:\Users\Admin\AppData\Local\Temp\Cab2B95.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2CB2.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06