Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:08

General

  • Target

    6d3cd0ea54a2ddb2897a7c9a70d3f9b9.html

  • Size

    44KB

  • MD5

    6d3cd0ea54a2ddb2897a7c9a70d3f9b9

  • SHA1

    3678ab4fb76f96fef4f8be6e3ca0662e052b3ecf

  • SHA256

    0a538fc8f0faae1ec463017ba24f9f1a67530b4eebe01e97f4a27e7332980d43

  • SHA512

    05a7aa90f9be088de63872e66bf345ea384e205baf08b03e1df7042db4f30efc7977f00d7ed73a2c417ab34488bbfac400bc064c3569bf5a985a363186e0f475

  • SSDEEP

    768:MBqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZ0:MUIRIOITIwIgIiKZgNDfIwIGI5IVJ7S2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    PID:2080
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d3cd0ea54a2ddb2897a7c9a70d3f9b9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d34a644589cc6c3db795f842767c9086

    SHA1

    73f3b6d45409aff8bef28e6825252192aae4ec85

    SHA256

    d3aa8f0f0350595d16a5ac1945fdc3380ba77df1f4461c2527c0a12a55abf09b

    SHA512

    ec65955a24e8eb91144a509e9c53f629afb6a8a7972c2bab0866c2dc4b522a8561847c1ef7f0c44aff9ae39fb52ab1c93333480a6d1624370647fd4a172c3f82

  • C:\Users\Admin\AppData\Local\Temp\Cab512D.tmp

    Filesize

    58KB

    MD5

    8b765c56011e5ce3a5b58dc75048ab43

    SHA1

    4e0f236a4e68f25cc3ac75efc0e2cdb39f4cb034

    SHA256

    d5e3e02fa4d88699053c6075cab8c7eae1472855f14a8e0b4ecc89af80eaef45

    SHA512

    95e5f4d1a1a2f111dd40805727ce16867666e873b8d08550d40424fe0b100e197a37aa994f225b984eca7f6a772c5346d25ee1251de4a36580012deb79c503f0