Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 14:48

General

  • Target

    26d4bbf12e3ac0a5bf6d996df6fd0164.html

  • Size

    6KB

  • MD5

    26d4bbf12e3ac0a5bf6d996df6fd0164

  • SHA1

    fb651b25c47fc780b54ae1f58c1bbdaaefd86d24

  • SHA256

    e796f10324f2201a132f3bbf9c66c1e82c93639f6620bb2b27b6e746537de171

  • SHA512

    ede76a0595fe5fee10b34e44ee57a25cc660cb9aa0ce35e1a2b21f792268e8bdbb992250136d770d36f9af4dfef4d7dee0ab3b62be54444916244df94c5a87a6

  • SSDEEP

    96:uzVs+ux7IvLLY1k9o84d12ef7CSTUSScEZ7ru7f:csz7IvAYS/eb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26d4bbf12e3ac0a5bf6d996df6fd0164.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c03a5c23c27764b7979aa899aa7c1c16

    SHA1

    e4a2d282a27536551aa5341710edcf9cdaecedcc

    SHA256

    880a78f59521fd2bdd04e7ebeb7cd6ac4b4cbfcdf49a2c90f0d5b1c438bb5c44

    SHA512

    8ada2bc434934b7f6956643d8c42570a332106bec46f3be5c410ba3ff6ca67be6be63f48be015cfe42b5262235f4e5e214a7898a6ea8c846053325b68e6cdd07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7df96c0551c96408157daa87708194b9

    SHA1

    c46e452158fc8fde12bde6bdca4ab20962e9deaa

    SHA256

    62c8834449e33c2ad21735b19bf1f87de071dad5c049c62c1f40c99dfd5b19d4

    SHA512

    94ab1cda14fba370da9599f45df0e28793587d502800946f2f656c33b0879845f8c6c5759dec124e3bc5bf48881a7e3904bc1ea76aa753c24636a83d41a1eca2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    85039cd567264fb855670b7d6b20b814

    SHA1

    e4318708ba731c2fb17cacc8b5aea36e4ec24811

    SHA256

    31ffb1f627d3cb946c952e599f0b4d2ecef01a972c88efb3254a0b4d50f83c14

    SHA512

    912b66364ca7717a84b35d52225fe0702be21035b6962bae20a5ce521c0531def1d2f57fec1816b89678d84b309ef69c5fcc7fc1cb4ee7496c081928391670e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    efc497430825dc2ce1c2ce602d1445a9

    SHA1

    5734cbf29738f5d788d10e86c83f25e456885034

    SHA256

    accbd6e0e4bc4949c09676d42bc5aa76199d0e619a24f87720b7bd93c27ef30c

    SHA512

    9053463562f42d8df3885e53f4d28b88c04214e40cf16f8cc906034d0048b6c9bb1f6ee498b230529a0607f6d45359e19453fc263cbeb044dcda638cda42dc39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5212cde1d494c3625eb322dadc0d32d

    SHA1

    508c9179485bbd6ba62d9e9979524e2997c85a7d

    SHA256

    58d574a10bcb8f0774a442fd4b967ce6fcb0f5e3eefcb2f632dade1f63ea331d

    SHA512

    8ab8a94f3a53c1a62a94c84fc820e08e3dee107ad496c474db9a79f3dc49a6b68555402c8263e51770d65e3da1e6bfdb1cfcd0ee592233561cea3e14df68a7db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ed3deeac7ed6cc4ca40fd646c8afc64

    SHA1

    5b43c137210719eda788e082afeeb0ec0beaca91

    SHA256

    43914025d725a3b263885b1a125555e9e62be0444e5809dfa2c24eceaca49ce4

    SHA512

    2be3bea2b6e1af973cf5d0ff7daec6a0c3bda7ce4a33552dd9786695b28cce4d613ba7688ac5ffa2e8de00b436cc87a8353cf32c1cf81f000c07e0119ab2d948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b38f3abfadccfcc7c9a520168ad78174

    SHA1

    ce0fd8c8b57e3750e1085c0459a57656df674f7e

    SHA256

    e6bc30b56691c1f3f27a96625dcf414fe5582dae3f4d3abdb4350ba91d28d456

    SHA512

    91061202f5f73c3b4f1fe16478ea3ee692073d981dc45e2f7580d65b269359c3a7d52b931ec8ae19c22055719418e6d2503bba67a53d72e25aa6f47fd2ba8f12

  • C:\Users\Admin\AppData\Local\Temp\Cab8BDC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8C6D.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06