Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 06:38

General

  • Target

    5a21aada89aed564de6e35a1592cd59d.html

  • Size

    91KB

  • MD5

    5a21aada89aed564de6e35a1592cd59d

  • SHA1

    6d1bc77e2934cfa60a47585004a6dc449a64fe63

  • SHA256

    7baf7bc6c7c34c6016d8819eb81d49b82b3b95f5a251ec8338c71b360b7b53f0

  • SHA512

    842d6e85fde8c76ea8e5777b93b11bc9951269051c3493d09727412ce092850d7210126ef8b7729aaea33bb0b07b9d1aadb1a2c3d8a1ca87c031aea533046389

  • SSDEEP

    768:OfayHHvPWloCUO8ewhEHWgXbG3Nl9R9IzCAyAaNQPfM9Lm2SmL:Of3HH2ljUOaEHWAG7AyAJM9LF

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a21aada89aed564de6e35a1592cd59d.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3580 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1RIAF1U2\js15[1].js

    Filesize

    10KB

    MD5

    4beb0b1c8bbca69316e6eadcd83b1bf0

    SHA1

    602491c5f60960bf4ba7c3d2e600681a06ffcaa1

    SHA256

    429e7004f3f8fbe42cacb984c36a9cda33efdacc100a276b12e82c6ab78bf7ec

    SHA512

    3bc8560d56f39ba09da8a3582587b9ca727dd9fa60582892a2a8a2d7de42fa0fa057b28986a0975b84589d8e9ef320f976b3731a19ea17c83388c1309041b8f9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\1825843[2].htm

    Filesize

    99B

    MD5

    af83d348c325ef07c270a3989d2334e0

    SHA1

    6e0ef4f4ef32267be9083973af3ac724032c1db7

    SHA256

    05654e2ec2f64fe882dcfb8aaccee1cad0332a762bf56526a4a24e920ccdcbee

    SHA512

    99fc66670bbf3701aa347860f34fe00a2e6bdaeab068d30145dc17d74f38d50dd35aa4c821d2b4c734e30f2e6aa65a568235034428e66be120091489ebafbba1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\px[1].js

    Filesize

    346B

    MD5

    f84f931c0dd37448e03f0dabf4e4ca9f

    SHA1

    9c2c50edcf576453ccc07bf65668bd23c76e8663

    SHA256

    5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

    SHA512

    afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\sale_form[1].js

    Filesize

    761B

    MD5

    64f809e06446647e192fce8d1ec34e09

    SHA1

    5b7ced07da42e205067afa88615317a277a4a82c

    SHA256

    f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3

    SHA512

    5f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W8BIYKF7\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee