Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 11:03

General

  • Target

    194f0fa1ccb0a05431cabe92047262d9.html

  • Size

    53KB

  • MD5

    194f0fa1ccb0a05431cabe92047262d9

  • SHA1

    16b8b22bb9c4b2a4c6f82b6b80414a1dab504821

  • SHA256

    e9a69f13a4fc1295990033fe583bb6e13f52a7b7a0585db90f629f0fdf534bc9

  • SHA512

    5567b77ebb2ed4f06da981c2f1d31bcbba5b30afd223c8af78ed8efac18c95409859237062aeed35062ec46d72959d1531424feadac20dd824987b681147aa09

  • SSDEEP

    1536:CkgUiIakTqGivi+PyU6runlYt63Nj+q5VyvR0w2AzTICbb2oW/t9M/dNwIUTDmDG:CkgUiIakTqGivi+PyU6runlYt63Nj+qJ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\194f0fa1ccb0a05431cabe92047262d9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d186f4c2875762dac88323c5fe00cb4

    SHA1

    64ba281335edd26c914abd4fe538253588a96da0

    SHA256

    4c034ab694154ac9f4923aa4e22a01e9a2ddcea035ee895aefd5e1556b07219e

    SHA512

    2f5d11fbc78ab3a8b052001b811b2aa980d574375b4da763339891ac4bc1f70a6addbf6006cd5e3cb1613ddc34b5d02b0d9ffca4add971c4de99246c6c7b052d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39d649a6e2229ee0ab2641ac032841dc

    SHA1

    6ab2d238095e6d9195bb9a177b93f14fc1c50274

    SHA256

    d5cca209a806604a48bb2401d04d75ea8d47533066e8ee1dc3335894fdbb4b18

    SHA512

    f2b7f93faa9e17f3748c01e49bcefe66e5c1adaea758b4e762ebeb60cace2b8dd9259b1f78e8f8b8046f9a487dbc877ecea6b00c2f1dc7c3cd4c530b5f874d0a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\print[1].htm

    Filesize

    706B

    MD5

    67f3a5933c17b3ab044826d3927d0ba9

    SHA1

    5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

    SHA256

    97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

    SHA512

    03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

  • C:\Users\Admin\AppData\Local\Temp\Cab853A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar854C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06