Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 08:51

General

  • Target

    132baa17c8a0b8621b7a09addfc9957f.html

  • Size

    18KB

  • MD5

    132baa17c8a0b8621b7a09addfc9957f

  • SHA1

    c16df49a11c36ce47a019c9ee81c584e92fe0903

  • SHA256

    2c53f9ec192412366012303f16ea4a1bf5a08f1ea4b7e2a86fe9745cb67d4d74

  • SHA512

    da5143df53a25b7c401c42e2cfbb9c8736ca7371697e651c4be6f9bb6a35e6ede51837180b39f0f9675bde1c108fd59e733e0a30209a2e6d3f8b83a8c58d7e35

  • SSDEEP

    384:ZXznlXIXiahr1AgdGgs8jMaztTLPAuz68MMv07X:5z58iK1AgdGgs8jJO8ts7X

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\132baa17c8a0b8621b7a09addfc9957f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d201101ff7bc71806c1df5a50dd15492

    SHA1

    50764b9653f79c7f6a3e67df21e6f054f6983e80

    SHA256

    4350b51d0371c749970bbaee3976d34fb72b7cb5b5101287ed60b04e8f0197e2

    SHA512

    a82eaf446ca659c471613b87f892b7a4472b8c606313e33de6bb06a1a1f7893e9139b44a41eed5b644804505728f2769e279711c0b7022d5c377904b7fdfc841

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5df26a8da4d0a6ff3861a7ef24badc4

    SHA1

    afdeb5b4305d4096c78662da8945a481e885cdd4

    SHA256

    0d0d0665d9ea82dc3a9582a9d02ec13673dc04d20cda73977e0ad94f020ae140

    SHA512

    25fa02b3318c59b5aec0239926ad70f3fe6b14e127d98fd5a6f30701b4daf3810ed605f82b3f7d0b5050a8118d62301f7e24d32c000927fa66b6a7665ad9a83b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c839a707056400db6dd35ac8deb32194

    SHA1

    f64d792bbf8f9230b7736377f60f255047208979

    SHA256

    f309ad8b48d9eb69ca74f8008cd2291d9db74e239c6bf0e00216d42418187e7a

    SHA512

    7ab7b85d9984857d61cb0e53090201e9774bc7418dfd270afe6dbe4882c67c0a7339e2f1d4208d31f7185e71c6ccdfd1a21db0d44b87f70e4430d1c83a716a0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d216809b9132bff24858f7de433501d1

    SHA1

    c5e70d1f698237077e8a810534d64b56f8b43484

    SHA256

    51566c0f312382ef496bf9644424ff1d20a5db59556c16bd34ce87349e7ec924

    SHA512

    37e427d6d321c32f73bc4fea44fa2fbfa6d783cd6cf4c2a11b164a5c1b21dd466386c8fd32971fd44e7ed1abc4355ba17fc02f90af748f9aea201545b9f1b8bf

  • C:\Users\Admin\AppData\Local\Temp\Cab12D5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1FD5.tmp

    Filesize

    92KB

    MD5

    71e4ce8b3a1b89f335a6936bbdafce4c

    SHA1

    6e0d450eb5f316a9924b3e58445b26bfb727001e

    SHA256

    a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

    SHA512

    b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7