Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 06:24

General

  • Target

    0b6bf1e236efd962516bb2559f04868d.html

  • Size

    3.5MB

  • MD5

    0b6bf1e236efd962516bb2559f04868d

  • SHA1

    7838c5024646e8173c757bf88e376e416e5a0dec

  • SHA256

    a80b4b67ec71b9c71561c60d2e4e4e687b7b0e0ec45c5a4bd7f1fa6361c581bf

  • SHA512

    68bb3cf4cd327751bff32fd780c41972e49edf8ec7314bbe15cc152bfb7607dcf4e9b644bfcc005b3189578a626e75ce65565060515d2babd382b14e3664fd28

  • SSDEEP

    12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NfB:ovpjte4tT6NB

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b6bf1e236efd962516bb2559f04868d.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3152 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\beacon.min[1].js

    Filesize

    19KB

    MD5

    dd1d068fdb5fe90b6c05a5b3940e088c

    SHA1

    0d96f9df8772633a9df4c81cf323a4ef8998ba59

    SHA256

    6153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101

    SHA512

    7aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\jquery-3.1.1.min[1].js

    Filesize

    77KB

    MD5

    5a2f371bdab5c329e5a13aa0d9ccd613

    SHA1

    72a6db420508146ad578d654fae46c36bd5114cd

    SHA256

    63b8e563fb3f44deae1efca73f7df2188105d8c621ccb4be4c0d0f2b25e533df

    SHA512

    7257141414feaf4e321bd7f07838664f021cb02373dfef8d736ed92b08e0234defb3103e765f6d8bcf04074a8a433c1e5de89b72af786086be3f259fbd1e4da3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\jquery.min[1].js

    Filesize

    52KB

    MD5

    b53a87d39f2e49207a683322492ce6bc

    SHA1

    cb90c5b3635fe4920911713c2f3cf41a9f1a4092

    SHA256

    555948f0a5d0016120a61e36e3d580dd0ceffe0d698f614b351e83129567a9fb

    SHA512

    5ec2d3eaef8a58e547463492e2f8e46c511525605960f6da320892341c5afa30b20a9c5bebf1cf95ef76829c8a692211e5236a8c8ba8764c8d2b80488d9e9d92