Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:48

General

  • Target

    1526a872720eb0f66714bc6dd173e2fa.html

  • Size

    53KB

  • MD5

    1526a872720eb0f66714bc6dd173e2fa

  • SHA1

    135de21622f4740ac23eb180a8dc7e3449bc574d

  • SHA256

    e2ce0b47e01b5ff77d73145d7bf3d427a4d2cb2d5ec46ecb2d4cb44b036f3fb5

  • SHA512

    3234adf30897a035d4f42c4360c8ede531f07d070defeaa152f0525166df0e9567e61b12411088dd3ddae02fee72bef45708d15facf97ca6559af6c072e47453

  • SSDEEP

    1536:CkgUiIakTqGivi+PyU+runlYZ63Nj+q5VyvR0w2AzTICbbKom/t9M/dNwIUEDmDc:CkgUiIakTqGivi+PyU+runlYZ63Nj+qa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1526a872720eb0f66714bc6dd173e2fa.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c91ca3dd55a527cbf7ef6ac2480e24f

    SHA1

    d647d67f8173f4881f45f63cc8427d034242f342

    SHA256

    4961e6fcdcd641eec5073236e1f09d16494daeeaaa23143c99994d304d18d2eb

    SHA512

    f49aab715d4c353236f45fa4c15aeed1ad25572a0b7df618d0bc95b21a1a354ee4d7b8a543e20b59461c7845d9dd3890000a118c00902074b194bb3017046020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2747a310bec667b64cd7ecb7ba2ebbe

    SHA1

    a2de45a682ccf8100392f3b5adaff59025b41f9c

    SHA256

    8a773365b650a5cc717c4fc5a100667f0a9d3932720cd770a3505d838d2daac0

    SHA512

    71700d3aa389ce96766a66fada070dbc259f6ae4a385ae6f3df074529a510f7f8f0771bec3589cbfa4845238450478cfa05adfd007aaaa6415252bf47cea1994

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    779d2849136f412a45b184e1cdab30c3

    SHA1

    614fef6298b0f3540aea7cfae18e6db73c8184e4

    SHA256

    86f87925cef7db1054d230d6a47acd0f7fbb16f7785e1832d3a8a5dea7a35062

    SHA512

    c8ce3dc7c03f8ac2a711b8f73d465ee13a779f3cbb0e0f9ce05a130deb887367ce8b094d3c8e6e1e34db626dccaf4060def66ab25345dea30cdfd46e0bc5e46e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LSNXCBKV\glossar-js[1].htm

    Filesize

    706B

    MD5

    67f3a5933c17b3ab044826d3927d0ba9

    SHA1

    5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

    SHA256

    97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

    SHA512

    03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

  • C:\Users\Admin\AppData\Local\Temp\CabFEDB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar516.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06