Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 08:12

General

  • Target

    sample.html

  • Size

    21KB

  • MD5

    ad9aa193248fef36e81eff838e0eea57

  • SHA1

    ccba4a15a143ea144320bbf27343940f0fb67072

  • SHA256

    c173fad0ca7f3bdff2ec24251fb9bd10a7392de51560d1ef3f529278ce8d6676

  • SHA512

    f29c8fba451b41d51d0837ec8a99abc73ee5ac292d2d47ea3f67e598cb2c658f9ff52eabfb1145ecafcda796664bd53d6ee8de05093c1c2004ab3ecc0d710cfc

  • SSDEEP

    384:PSFpvs/u6ZCt3p0njAjhw8XZl2/1RFwvMotdvu3hl:Po9OGt3p0Ihw8XZlLM+dvahl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3410219887a55373d7f2fe1edee990db

    SHA1

    e3c0293a0b5d4b28cd4736212cdf067e9a4515b9

    SHA256

    c0db3b769be7dd394a7f1e956ab4b220b8f3d4e58c604189917cd7d00540aac9

    SHA512

    efe38956359734120b2abd746ec08645f03a45fe23b74ec573ef711691ae795cf769350ad366e3cfabf54ec0384ec374390ae457936a9314844269345211833f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    defe6b677aa9884d8ce7ff1b72483bf0

    SHA1

    fd433c238795e0454298c5b18b3aba03cf39d05a

    SHA256

    7737670c51559ed7bf7537181b8c408c31f5e03056674b03cc4cdef6c1c7b98c

    SHA512

    38090ba0022ffbb75b85d57bcb2cbccda5264692cd1c7b65e2ec8eb9d6c08dfa71563d8d090365b94b44e8994a2f7e66e25c9f6cb684962ef01ff477fe16015c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f040d2b0cbfc7fc7a552215ce892086d

    SHA1

    9e70a6d65617dc5fbb927747cff2937458285afc

    SHA256

    70cf28dbbb921aca6e988c8c41e89b7cb83951d5a88e5b37090e1e6635631b1d

    SHA512

    c3af95030beb32c46c54a0abb5602befef0b148ae5756b7d93f34177bdfc46556c83b7d8788fdea8b9f5a1c5fa754f27fe5c51e95df3dd48957411a7d82b67d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cea443d68ca40b6d0bff8603ec1b8b2c

    SHA1

    ab35cb33c369a40592852816d63ceb38def28881

    SHA256

    97705b672bb5366fa4ef183c80de2f9de786bebdaeb0570fc0bf0c16013d1366

    SHA512

    b286b9e1ec4b262c993c3dff4f0de4b48d448106892c7964a89d2eed7add974437919ef9bdd581e556c4230800d21541f59aa63c252795fdc630b4dc5f3bf53b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\X6A9MY0I.htm

    Filesize

    114KB

    MD5

    1fc33214a308d78bace104d3bb3873d0

    SHA1

    e458a02f7746553c4fb51ecf077bdfa5052221e3

    SHA256

    8313f95fae1ab43cdf5dd271f400f632692c1159c07feba5a7cd9e48acfb758d

    SHA512

    c55719857433fdb2a75a535b04f11647c6ee5a8b2cf451858e01f7e321b4c8944b6f28e27506432ea2ce74cc2696fc19c53aa442db59d99af2774e0a272b812e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\Hot-turkish-girl-sucking-a-thick-arab-cock[1].htm

    Filesize

    5B

    MD5

    fda44910deb1a460be4ac5d56d61d837

    SHA1

    f6d0c643351580307b2eaa6a7560e76965496bc7

    SHA256

    933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9

    SHA512

    57dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1

  • C:\Users\Admin\AppData\Local\Temp\Cab15D4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1673.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06