Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:55

General

  • Target

    157c382ed0ac37af58ce149af1dc5792.html

  • Size

    6KB

  • MD5

    157c382ed0ac37af58ce149af1dc5792

  • SHA1

    dc82bbc80a55436ab24c0f5c20d5fe3d76e47fbc

  • SHA256

    e8aded23410b2a227559d9ba9f42ffc3c60057a555da5ff90596e6db9ec93bea

  • SHA512

    726ec682d67e7c3db80926e7664102f6aad205b67721af83eb253bea3ded01723d064e9b275537c73bb15944585c3eb5abdaf5ac6ed77360ea51e003a25835a5

  • SSDEEP

    96:uzVs+ux7lOLLY1k9o84d12ef7CSTUJyB/6/NcEZ7ru7f:csz7lOAYS/3d4Nb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\157c382ed0ac37af58ce149af1dc5792.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8af8b2f2caa71d7882a023a5ee4577c8

    SHA1

    2035ace097b9aff86543ff016706b55dcf3f7166

    SHA256

    9777c1ad76b1c99dde850f0779c10ddf75ae293475aa7f29284c25a39156a548

    SHA512

    50604f8fda8c8ad7be17627d0762e1a00ed46184c346008186c37e88ee640b22a590acc17d3ce2c78a8c17f3ff50227516f3ee4295a7ab0282bde7751f4bec94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09c71f19b3e519003fa512ffbce6333e

    SHA1

    ca7ca10cdf1a6649d120446a7223cd9c0bb77707

    SHA256

    bc80d799c9f85351aeaff9c4a587a3abb6186ded6fb498d961de67238c6624ac

    SHA512

    efca2301171ce7d57a254660d6e26e3b0e8a254d241f1b44d6ab1b27dcf45c489cf5280ab8e23c7c479a90aa1beead5552cc034c8fc90990cb0763b06bb58af0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5928c56c097f7e6a13b06b4a0ca94300

    SHA1

    d71073ca6a4f0a6bb6e99eea3eefc0158b3a5dca

    SHA256

    a53c8eb8829e075954751f3358d8a0d92043e2de3deb1d7254ae514773dbde7c

    SHA512

    21b8c250a6b547cca5163c9e3e752baeb6d8442fdd88fdd0bef0ff45073d10702c9782ff4b52b1c615797655e30de182a1f992628979dce1dff9e669a4d932c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d31364f269b39f78445e8e7054762865

    SHA1

    d510c04480cafa8d71f0b0dc42302b6b70ae2a48

    SHA256

    9a92986e627b535b231957cb82b45a9b82b0c6d4c3371f499123b34f9bbca423

    SHA512

    d020356c019a9a0ba27a4cb5fec8243584fecc21da983279f2dc7fa068aa06192c9dfc85fe42100722f1ab73b0caf1ee875e44d03a85ee3f090869b54d1df413

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3f26f62cb9594a30ecc4088ddd9512d

    SHA1

    058647e0872682c07c29e56e343b4293b635d8be

    SHA256

    9b5b9b442445d273158b55c94db236cf9cc963a0e639710f5531cc79ca9c7574

    SHA512

    fc366af8e1b2b37eb67c9013eafa47e5951751b9bbc65e654051b0f0ca04b5a12fa6d4d369d623fc628ff95dfdb54635f712db6c22395255f7668afe74ec5679

  • C:\Users\Admin\AppData\Local\Temp\Cab23B9.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar24D5.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06