Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 22:50

General

  • Target

    4155c799c5ee8b8a955c506819a77884.html

  • Size

    53KB

  • MD5

    4155c799c5ee8b8a955c506819a77884

  • SHA1

    2997ea9c8f374b9195560ad56f8fd36d88b7ce85

  • SHA256

    dcaa8aad8c7b18c2efd6a8419008b2fbb9b32d5cab74efed853a33c95eafe202

  • SHA512

    0b652d3d28a8fa0b620e9561edb990d9160caaa85f6a5736bc8c925d9d5e414e59fe0518c953331eca529155d577a735497c6b3580fb00518da04aec17d189d0

  • SSDEEP

    1536:CkgUiIakTqGivi+PyUNrunlYs63Nj+q5VyvR0w2AzTICbbioJ/t9M/dNwIUTDmD0:CkgUiIakTqGivi+PyUNrunlYs63Nj+qS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4155c799c5ee8b8a955c506819a77884.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d0ab3ca1b325373482c46d1c395e8169

    SHA1

    e1ab7fbc996e193c3eeeaaa9255fecaca2ae4a1e

    SHA256

    40b050b43032342bc61e866329b17f45d00a663dbbe3104d0812fee11c210402

    SHA512

    54c8412e5f0cd5790b0ec007d4fd7ebe5f68a6e6735e0db32ee8018e00a1ae1014aca70bb404698f879954c3ae0991dfeb5b503df253887bea3e1994658467cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    69b01cf3026c8daf392bb05262a25a7b

    SHA1

    6d372d69f0397cfc823e3bac273c8226fc218a66

    SHA256

    bfaa0b19eb6c3584f5b101caf3ea1a0b248ca1e7396f33f7f890ddfb73ad4be9

    SHA512

    b7b60e2bd0c1caf9d6fbd6a5ff83948e1a25ee29070b0c33d51e002b5b264442d22d4b757aec18393ff238eb26f366d5424161baeb1662d05bc5b6db902872cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f16fabf5f1d3c66428ebb083b50118f6

    SHA1

    8c28f57792c7e7551b675d60a7f0d3a047cf57f6

    SHA256

    4f9adcca13b8e04ffb2aff2d0740920729ba05224c8204481164292fc2dd3f9c

    SHA512

    6522ca7beb31b28e7638e716d5b2791955450acc96d36a22bc80ddea601ee4073e6eec48f63dbcf4954fcc04bc83590f8aed726232c070f38ee170223eb0703c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    542177781fa174b27e91e1645aa1f851

    SHA1

    609cdf14c7132fea16874b1cf8eec7baa064f7c1

    SHA256

    e0a5001be43abe60f9105c87f8d7252b9a356a2992091378071e272e6b0bfd1b

    SHA512

    8f106b3b9352b719aa5f441f4ee7c58c97f848dc2819ddaa93cb3ef8e585d8193d912e3ffdc85fcc5745a5c1d03ad7bd149403a90f5abf1989a0bf845d2111f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26bf715f2c0a1672001da949d7875f75

    SHA1

    0bd2baceba1015bd3c146b25e41c89796f210c93

    SHA256

    43c550da37c7493f4f9df367587a2ff4af16fa34de7b46c76acbf045f6590434

    SHA512

    35e8357e7696d2b40fc1f86bcf09a62d0a35ff622e005c2e2654b2455b26474fc430ee2ee709b018fb790ffe88b1cc40ca233542b57741b097fba96a739b72b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    813949a51d9b44da84d2b3d46c541f7f

    SHA1

    08f609c47f19a47d0e314b9128cf570360fe81f7

    SHA256

    7adcce11dc0a5b3d462fdcce76c24b64133b29a03c99af6cbb5e4e3ade338898

    SHA512

    c357f078df232131e4593c999d98308cd9b73e08493bb0bb01ba70d75689159d1d79ee96848c8d30953be95e8037c9850ff4857171f4a50d90ee22f2ec0a621d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9df8ff8761a10a80f7eb88d9038570ef

    SHA1

    0226e44fc2bb5de4f4a6976616c3f3feced2a78a

    SHA256

    87d69e0018554f0d6b014ad799a5bd04a016f842627ec9ba678bdb378458df84

    SHA512

    f15de08d4c49d003445bc9cf59c3d235344058133ba3bc46f28f66ad4481ea11f905882a465ac83f2ee329ac4f79aeda0b48f0e3c6a566c6b5f56f131ece92be

  • C:\Users\Admin\AppData\Local\Temp\Cab875C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar875F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06