Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 03:52

General

  • Target

    51eaeecb02977fdce8d302475c297731.html

  • Size

    57KB

  • MD5

    51eaeecb02977fdce8d302475c297731

  • SHA1

    e05ab2b9a3608342562666480e07a898b53bcb14

  • SHA256

    e7cb91c2f98d1dc6afcb803ec67871bc30602ff72f242c08c1dca646d48f2514

  • SHA512

    67ef7fc10f7833f7bf1afbb5dc8b71c4b02233500ae0a9d2a1536975314a7e06da36921a5b88150c0300e2bea598bcbb41dc036d729102a90157ba3fc28b32e1

  • SSDEEP

    1536:ijEQvK8OPHdVABo2vgyHJv0owbd6zKD6CDK2RVrotcwpDK2RVy:ijnOPHdVF2vgyHJutDK2RVrotcwpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2
    1⤵
      PID:2820
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\51eaeecb02977fdce8d302475c297731.html
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      016749b1606136169768efda608d1b41

      SHA1

      7e5fb7ef059585ed285665b23a19109a307a2757

      SHA256

      fa37751e9b8e0d12fc5e345b659a5a77f21e8c3826b9a64d0cff2f443d3e4440

      SHA512

      9de1b24e88443631c004a638121a283a4914bf6d02cc550d7b5ab76a8c89d1941b3adcc8a484683966015186418d091446cccba61500f198ac8b8c67fada9330

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      15fcff560a530e6100e58d351d28f592

      SHA1

      fd948cfa6c9b4eda4338e671c619a2005e30a750

      SHA256

      df731b945db7f96bdd9625b84322ae6efdc8f6f54e3bcaf579c40806ccc411c0

      SHA512

      f3115c688617a98f674371becce1b6de93d3346aecb2859c342e838fe4fd7805b01e730581d1fd6929f76cbb6aa97b97950b779f376016118e171e6554326d69

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      9ce6cd275c374e8bf1f8189de6fdc628

      SHA1

      dd8e8cc8ada41740010d5e0eacdc8d73ee26626c

      SHA256

      01d82308cee80fc53340feb53cd7dbc53720cab9ba073c6aa32d95568b13963c

      SHA512

      a55572505316257acfc359d565be9d237a6a11d205ab32cb1389a58a9fa8cb58bdbdd24e592d1763a9f178c9bcd8e82cc56ba22016ca87be0fdd2ad9a0d22175

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\LALN3BM5\www.dailymotion[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • C:\Users\Admin\AppData\Local\Temp\Tar173D.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06