Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    191s
  • max time network
    215s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 02:07

General

  • Target

    4b8730adf6a9062aef8c6039302fabed.html

  • Size

    78KB

  • MD5

    4b8730adf6a9062aef8c6039302fabed

  • SHA1

    02172949dbd5cfad7e72d72587edcd2c48cf3987

  • SHA256

    07c429b7c08457a56cd916191614ffb43a01ad92fb5588ed93b47d93a20060cb

  • SHA512

    e93e00df4f3e708d78b33b1bb931f4aa94506834112756993e5500e896c682f1c647a1683f140092a779a1b811152a45095f9b679bdc6e1ecac1349f07d779f5

  • SSDEEP

    384:SI18ol3sL1FOx7xAZrxiv18BkAWQL4S8d4nwZLdkQk7S8d4nwZLdkxkpkrkZkbkQ:SO4PrqQJ8xZL98xZLsnV8xZLCB

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b8730adf6a9062aef8c6039302fabed.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e58240ca53cc7cac866efb70458607be

    SHA1

    2c585e752a5e43425a7816b93eb7cf07734fc146

    SHA256

    007ec6d51f91653ecb8210fa8c94de66d38d70431b729a58ec9411377d750e35

    SHA512

    4e1426048e19fc5e7ca82de1dfe1d992af30ff3da700fe22e3a975362ae65651be8437065bc74812b66252b6975aba2792ce508bea8c3ba5fa128e24a89def5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdefe50606acf6d85401e240a720dda4

    SHA1

    99d025996d87d2a951911d50ba78ff061cc9d542

    SHA256

    655b02024f1f06cd82e56b72ebca1bb882cd1fd766bd3a39d6bcafe83939c96d

    SHA512

    9878dacffeff73134b4c8a765105d6d9209022fe09f772cb116d9f34a8deac30ae33b9c93fb3e42ebb58a081fc67a9c081036b8dc5990f99dd97ec1556c6c087

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    958cde613e6d775fac43e78517e40990

    SHA1

    e91ef58bdf248aaa36ac407a1d6ad300a296271d

    SHA256

    d2acf753b3ecb6d5ba0bec3e609391cf3a2a8dd6ffe42b3895f39f297fd20a24

    SHA512

    f38a55f2059a874a3cd37a72ce17421f8ba650594dc185ee9906cbd1fa58669fa3ea0b34d315ddda6f87565f843207b54b6e4c5d20055d8224edcfff79bab7d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc5a4364d10c1e8a2807757708306bdc

    SHA1

    fb309a88e65636a10b7afa3f79565c692155e824

    SHA256

    3f0e72ae61465c3e16bad8018dd50bd6bb74fc7d4fe1d008da2c469dcf40a0b7

    SHA512

    6ad2750f48db3f8a64f175f5d1d70f1a9dd77a032f30dca6811564b0cabcf9abe2dc8f7cae3d152bf5d5b7e2fab1d87f89a55789992d7bf5db243b35d4885906

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71e5ca1f0d78b70d06f83419fdfd0449

    SHA1

    9743953926640c064d178860670554277c6b95c5

    SHA256

    5560ad992e3ccc8fc47ef4b09a6b2a97927dc4350acdbb6f849b71adf90d4ff1

    SHA512

    21e090b5bab53df25748e69107d5f694b32579ac713bf56a8cbd8f3254ffc0c29ebe481dcca2e71bf0e9335e49e211918cfd8c2b7f9bc0d41149aa5fdfce3dfc

  • C:\Users\Admin\AppData\Local\Temp\Cab569B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5B5E.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06