Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:55

General

  • Target

    1221e40ffe08f9a4e823012fbc038bcd.html

  • Size

    430B

  • MD5

    1221e40ffe08f9a4e823012fbc038bcd

  • SHA1

    aa40bda2fd47550b7f429937047b5450bccfddaa

  • SHA256

    7b7bf594aaa7130ceacf9f8cb3d644e60481b9d082b67646928c470ac0503781

  • SHA512

    b442c548369c02c444b8c538d4fa493fda751c3deaf38420cba7f1492198f5ead46c6f5523e228ab3e3c40b639a757731b0f440cb5faa9820099c486f3befb87

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1221e40ffe08f9a4e823012fbc038bcd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0480bea9b141b8305ee7e071b693e119

    SHA1

    e363fc36b64df9fdafe89c73b3c7529845fec2b3

    SHA256

    b8304910dd6a4679e659fe05b4482367b3dcd1a36ed5dff9a111d1ee62cf9427

    SHA512

    06099bec32c0d254220dda760ccdeecfdc5c757b3bfcee1384df7a44d97a0c9c9ca8f47c2f6247a4c9d54e7996e986eb8827a0f7fc952c9e076e79e45410e8f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0d867f68614860a244301383aba6998

    SHA1

    b6a8019429ec0841fb423aa5b81111f459ee5acf

    SHA256

    9c68619cddf42724f9af0eb2ee2e82be36e1d8961fb71fb1b577ba42176f619a

    SHA512

    b553d7b0b6c80fd2c395ca2543341ecdee4196e04bd1b80278bf9ec80f0b3514c772266224194fed97e891c95411f919d93de2d8becd2380da7e322745ee3ca6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    7c61d319b8ad8f7946809d5b5b842740

    SHA1

    baeb8d4f9980f06df72af1d03b7de87f24a80834

    SHA256

    8c48aa10395ae898d646172e544ac9ad5bfcd8f8e61ce354e1fd029f0459a222

    SHA512

    9cf1984e0c57d0677462fed0152a004f567e55c40d900f894470ed80865f19a378db87d4fd1dc07b431f688d635f5ce77b90eaab99c6371908ac349381bb4c04

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s8rbov0\imagestore.dat

    Filesize

    5KB

    MD5

    beb4169c98df5a43794434f6a2936695

    SHA1

    0991263245c9b7e9e27ea6e2abdbef98edaff9f7

    SHA256

    40a8f897badde9382d96816bc863ac187c88277a0ddc238e5b00a2c1c4b6650f

    SHA512

    1cd00ab87d558f891fade97e2087834ef64477644b20cbef39ce252dd6b28bb7783b327e2d1dc56d67fe6ffa3c9e00d61004a74d6d2b2e08dab7fc474f8d1b9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PIZ13NBV\favicon[1].png

    Filesize

    3KB

    MD5

    a75c230f34b9296e6fdd8b0b855df5d8

    SHA1

    e0b9e32053d44532fb4e8bb55b54c3211965517b

    SHA256

    8adba20b1dd9747ec8ac6ed5a26a8dfbfc7ab82213d8051b76ac771c76b87920

    SHA512

    950b94afc397ac760f38f4c68691bda6b541832e1d23f496e36568def2b9f9dcb6984c6a42ff6b5abef0e19b76c37e40baab22e9dcc9360091b609333029b24c

  • C:\Users\Admin\AppData\Local\Temp\Cab1557.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d