Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 03:13

General

  • Target

    4f51d3bc3313a864b2cf90c2b826d168.html

  • Size

    125KB

  • MD5

    4f51d3bc3313a864b2cf90c2b826d168

  • SHA1

    91747466b7f28ccd22ddd12538ece90b403b3101

  • SHA256

    9448dc50e946c96f2a68476894b771add52856f7116b9817e8470bf00958405e

  • SHA512

    ecae58a591dad08528b032c449233bc448268850e0896201de8a4cf6b7692feb380e17e8620fbeb230fd2ce3cb5df898b7edd89b7edb74c7224315a5cc4ea615

  • SSDEEP

    3072:L5gNiD4D3ZnW/8XsP3gEoQTHbuybkXbkNPgUIjvpqT+7MR+8N:L5gNiD4D3ZnW/8XsP3gEoQzNPgUCvwTJ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f51d3bc3313a864b2cf90c2b826d168.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    906d824f3e44cc6d972317b41a33229e

    SHA1

    7d9c39aed94e8b8e582cf0de99dd12261357db47

    SHA256

    86f7a7df4cde07b60f91bd7da17cce56cb8f0c8bebc7f15c736f8f202f30ba0c

    SHA512

    4641dc6206ad2148b311d5c163a2999664c89ad752fd17f7246cb4c528d761382614fa7b3e3e8efd49e00f97300705d10a3db6618abad69e71184d0e6267dad4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cae515c4fbccb61b22b6d6a0e67f811f

    SHA1

    58dd9e8d82caac5b0e1efe58e027b69f8fd3f7d2

    SHA256

    01e07e7726824443692692082b835656330e04273922bb4c01cf8f01a86328df

    SHA512

    88e1f44511f95d6bee3357989018cd816c8ff24fb1de244b8e6b6331df94a6776346666fd66238b5496eb1ae84eb5a1e778995a60057311c493361eb166df4ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be4a40716a2753da4d1363bfa948914d

    SHA1

    57c1307e97d951fe2f2cdc8fc05ad93b4550020f

    SHA256

    e114bc32063ff9e34b9ebc7888a225057c92f1829e5aa0d6b8e24ad2558c3037

    SHA512

    30c7727d8ffc9bc5a03e5172123dae39b73f916918c58d81bad68f44d080ce40914dfb6672c745b74336be6b4ff4982aa05f5bab70b8ee7e259a3515fc59651c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06835491abf2aa19b9e274a1853f9ac0

    SHA1

    dd48e1026406c0628dca6bcfe756127c229e2887

    SHA256

    14a7301475f08062800f7fd5744fd7158f3c0daf9546eaca915c061ee4e9df68

    SHA512

    d12bbc2cf1a277c7e1b097108ee68083f135a3475d94e30722d6f589a34b861523ccd3e8d7812055bef6f7f0b066649b2cfb89189a56001c2e6f4389e54b6e79

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\site[2].js

    Filesize

    52KB

    MD5

    fc51924810c226bbf3623b790680672d

    SHA1

    30e1011448694904924570803a56951e5d30bfe4

    SHA256

    45332d63c6b65ae5219e97df79c2609715f9798dc0257caac1f33bb1bc4025a5

    SHA512

    b288864379c46b2a4282bd078aa6c2c4254bcdc955630910d3de76aaaef622e1cee4c234fc664806f7bed3be73dc634573983b33a38fad456cd284f30ef08bf5

  • C:\Users\Admin\AppData\Local\Temp\Cab81CF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar81F1.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06