Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:04

General

  • Target

    420f81f57beb61d9e88950bc81eab180.html

  • Size

    57KB

  • MD5

    420f81f57beb61d9e88950bc81eab180

  • SHA1

    67696c838564dc8dce2f791d9046cdab7e1abc90

  • SHA256

    e8398003f71f875dc0ecb1ced2006f4d9f3c6bd07733e2b8c10deec7f0d0a753

  • SHA512

    6f6b41a6b21ed462cba5f7fbdb15d34b42be4d5669e3d49a742ab327e632974ab42487889a6e451192bdf55f34e13389fcdebd4c33c0909f73a6d85702fc88f7

  • SSDEEP

    1536:gQZBCCOdx0IxC3FR2fkfnfKfJFfkfofwf4f+fsfbf1f5fUfkfBfdf7fIf7fEf5fK:gk2n0Ix98fS7Mg4wmkjNhcsJVjwzsR2p

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\420f81f57beb61d9e88950bc81eab180.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87525816f1689d54015052efd7838c6f

    SHA1

    24fbc8e7d8acb12b58947eb0b931cf3383607d40

    SHA256

    256f8d090845839aec159048e9cf04c862488b5725e29f6b8dbf08846f17ce75

    SHA512

    72457ae50f8a9c67aec64f8e47652fce3a2362878397ca0a83aa46b66b4f9547c9865b5e8abb862743c957805b1fd3780b80ec6966ac44d98fc8c0b3ebfcd4df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0cd7d3fc24e1daacd02bf0b2de38577d

    SHA1

    5a3c56b069708f9fc40d889979db2effb30f457b

    SHA256

    eddf41ac173d04e105de15012d33ae6502995ced56f47314963f712fd51e5bd4

    SHA512

    881872ed73a830fc23025f42a588c3c090c4a2c70ab54d3c8ea784da191465cc35a65e4f464b3d74ec45f6532258ac65a517b9281e668ace3b68e70788905d17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cba8ebdfa17dbe16eb4e587cbe7be842

    SHA1

    1ad665f29c650beb56cd97b3b0b74e40b8e82aff

    SHA256

    c43d645dcfe8e63aaaba6546838c4273e190f24f12c2eb469e891ae91bd74a69

    SHA512

    676b100a8e4648c0243cf70289fdb1936d4f7356f4832a7fb088375bb8c9c41c9d73f485ada86539fb8aefef26a8f802235a26fd77de6c559d3cb10f91579546

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80752221f2647e9d03726087d1fe546b

    SHA1

    524bd9c1e4c930cacf9b551d6bb7746763859139

    SHA256

    bc06f9647c13e9215ed1001634cecbce7548a718ef6ad0629afa5f75035efda3

    SHA512

    b5ed6b6021044ddea4ef7b81d8965af368b23021057e6167f16e265f10213b85ce0bff9b29029b98ecc7941afe6b8210a7e898479b31c8da5595e170c931e19e