Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:10

General

  • Target

    0214fc387ccf09e2e4e117be8b34db18.html

  • Size

    48KB

  • MD5

    0214fc387ccf09e2e4e117be8b34db18

  • SHA1

    aace40ae31b43c2fa4e615b347a1149599c356f5

  • SHA256

    dfc3fd3416af5940777e68086daa14d15c39182c818e9b050f97b9f5cbbf9e7b

  • SHA512

    32840a9850da6816375a686fc2257218b54688116f040109189689096d8457d706582b652b09564db00a495bedb0d6734b44352107e9d23b929fe99a5fadfccf

  • SSDEEP

    192:rvB5kd9kn6R6r4xc6tqTu8fyOHwnl1KIyOH/7ax4KOyOHhS418tnNuW8ttNuLiMe:rvBY9p6SUtqJ1t9sHyWZgoWk+1OQyW

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0214fc387ccf09e2e4e117be8b34db18.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9705ad7191a63fdf863914606f98acb4

    SHA1

    c6fe4d8dcfeeacee1634969e0321bf5b2780a4e1

    SHA256

    97f4afb0de51a3cdfa4a9a5a42736f6e8d529310f0d480a9f5908f79b7d135f8

    SHA512

    34ea560adda48f152f3bb9564e23df50da97c4a4d2aa3d6cf5f4e54ad7e94bd4b071c41a7dd66f72f13db8c50fb7cfaf7b59b5d90d1cdefd469104d0b22312c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ac16dc22535ae3f9a8f0680cb63fbff

    SHA1

    ad988f32f038111bf493fd994f8e132c156fc7ed

    SHA256

    f534186f889b14e4a7cc81adc14031c44d692e40af0cb8c4a3a1dacbdcd97abf

    SHA512

    c0d002c6b4c039d6b6240afa90e3ee6e97af69cfb4c35bf0d58e13eb8ac1f1dda8c3e165fc7aaba714b36441f288fbac859788ddff4f9b53f6fd27168d9135c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a03d646984a911c099475fdb9b2c5eb4

    SHA1

    d0e29299b012a1d1d6240ff1f0f35dc356cca04d

    SHA256

    861f14b8fa7db7fbcd7263f09183e2e1d9b5d8c116a84eff109b0305e39f6c7c

    SHA512

    c14120313ed0bb39f70fbca1223fd89da3760e581d1934c4f256813ddefe89894ace298b480d8c4999944668755a1b8b6f2bb9c75ee4ec6cc7c96b19400d8bd9

  • C:\Users\Admin\AppData\Local\Temp\CabAEE8.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB37D.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06