Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    165s
  • max time network
    199s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 10:42

General

  • Target

    180d8ef3148bdeb74fe28dc9ae4eaa8f.html

  • Size

    4KB

  • MD5

    180d8ef3148bdeb74fe28dc9ae4eaa8f

  • SHA1

    8aeb632b90844b677403153b543726e85df4579d

  • SHA256

    fe2830867ed96e98945271bf488f3bf7f51164a1d5b5b2a737b62404160fdab2

  • SHA512

    af94a86195cf62cc1a3b0688617fbe3c14f4cbe0b8f38480c56d1ddeef16e07b8c3066b9b2f4abcfa89b0b56eef4dbd90d958196d307af939aacfaa0caea8fbb

  • SSDEEP

    96:ZWXGt22yDf4abXGt25FSZBtKIoRlCRlLGwxGctaZF:4XGo3rBbXGo+08GwQctm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\180d8ef3148bdeb74fe28dc9ae4eaa8f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4822b8d8a82c49088dd88ccf2b5e5471

    SHA1

    837bdd54ffbd6098fe0e2731983772c185e123ff

    SHA256

    5459781ea9c65ff3bf492dab7955965416a3b0ccc36953ccfa5ceb7da5178d0b

    SHA512

    d45ee9d23ce2bcea68ea829d1cedbaa2b83ed64a31fe7280911aeec293222bcc235610f22c8c86d7474cbe6d359859ee3a46d8f25a6bf7a815a4cc52bfcdcf7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    678c9f5c2f469533d45bd4841b2e3b89

    SHA1

    849fd0829f5f92593b9e4eaeb607dd56d22ac0d7

    SHA256

    1c55e68bfd3d4e44f942de784e8700c1796a7fce04efd76445a2a685d5b6138d

    SHA512

    21427163928ee23b2dedc86871a89a28b051f3f9668bf5f065add10c7e8ff2e400ce2b962faa24e885cf8cb11f50433d1410265fb0702fe1b91173e92df1af1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51f9f8c7f5d77b7efb122a051742f364

    SHA1

    eab75869ddc8eee351f850b7d3d63ed4fdce6f11

    SHA256

    07c755ae86cf78f53e0ff4f0842529871c57bd86565c5b9caa9546f12047a95b

    SHA512

    4b7e76993b427e3f4a245cef888090bf6985e5d314e1e4d2617e007648c58461a6cbbfe19f22aa81f1f670cc6e6fc7b2b322246fa5cb3bc62d4153ffe3eb19f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9a1911ef5add0ac6b330e0263047be1

    SHA1

    119528cb67ba1662ed2a2f0382fb2d7e25ca23ab

    SHA256

    8c1a0d49e4b7b1d03708e4d7c1499098db93ace86ba8b0ce3ca7e3f421eb9163

    SHA512

    1995d432f920679d87604db377bf8b180080608a946ce8cef805bf2ce7f4253cccfced487849943301f2000e002a6ed17f013fdaca2a08c97bbfcdc3fdf93868

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b28612dd7f5ceb1368d6794711d032db

    SHA1

    62f4f0ddaebff6d01a7f8901649e0dc0ba3fb098

    SHA256

    d63cd3fcef572d12edee5d122a9764722dc476a2e8b97b3fb75fcbcd6c320d88

    SHA512

    ce10e561cd03db73a1c924aa14b4d5e5ea9ef1a9ee4b78b0cbc134b953596d043f53e15b4ea343de6523fe6e12a0ed64ef2bc7132d3c37294d1ed161020e6aed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bdcfc8976f76c21822db8bcd4c4e3b64

    SHA1

    13c86bf6663b4aba7d2756732b35775f82dea2e0

    SHA256

    6665f2870811dc26d258500d385de5cc3e8a0155a565ffe0d1a1ded759775292

    SHA512

    73b1dadf46f5eb8da750ceb7a7140a50acb1a9c709242e7fc3ea01fbfc9e11d47e6e0de85c768d0c219ef80db0f4862e8f53219391cff9998c786edf9b15129e

  • C:\Users\Admin\AppData\Local\Temp\Cab8C4A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8EDD.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06