Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 14:36

General

  • Target

    76106e0c5266186d1a205821cb30df28.html

  • Size

    14KB

  • MD5

    76106e0c5266186d1a205821cb30df28

  • SHA1

    397fb9e1f31e0651b8534e6e91b1420c44f3a924

  • SHA256

    dd749dcdf587104042363ac425f87cf4c8e533dae3d45f8a13d04b8309d70c2a

  • SHA512

    8a650e76e67ea23ce6677b3c59b9e8cc55a6fb5173fa1880df08191069a5da84db55ba07f28ace192d3b2aaa8cbe940cadbb32de30a023a2fb46ef2afd829dc8

  • SSDEEP

    192:v1f83p+E3P3zU0n7eOGd9gmGRw5XnSQsW:tf83p+CUEeOGjgmGCxSe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76106e0c5266186d1a205821cb30df28.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4cd2c62304caa6a2004bfe46cc2698b2

    SHA1

    eb5d43679ef71063be57e820db6c3a78e14db1ff

    SHA256

    331672106eb10d1c19a28c2abc940b5c7b11fe56345e845697e18953bf3ce01d

    SHA512

    0c21bca18c50ac43e80feaa4ecf87116551a6f97474d790c786ca5d2a7b8bcd8769149051a38c9b5eb72002b40da83712eb244fb634cc637f5c3d4ea50f52d47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23cbe981e39a8a50f18fb5109b7e00a5

    SHA1

    6bbb9499621c27d8fd2df0bfe3500e2ea42f926d

    SHA256

    bb3e365d9b8aa05d0978fcbc624b85eeb8ae74c3231a3ac4c41867cee4b37809

    SHA512

    9c469f4e1e40d87354c112b1547ac5b6d4ebfda042069849319d1ede73abeb1718bd67222b21ba7287732ce3aea4490dd4a43ca5994ae52885963e7c1f389c09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    984484632416c46b0ac4cc708a107684

    SHA1

    dfcb8ed0d1cf44071cd1bf0d1c9dc9de72f54f65

    SHA256

    85e847a41ae7fd58d85c59755aa9eb23b3adea88dffc98875ba840e0a257214a

    SHA512

    e273ca7405775e6b79ee088c130229649f0b2f522bb9ff63f1b9b21f41ff07bcaf30d3813de616f5d0b2c7aef1aabd5d149825411c0b12d50a98fb18a645f97e

  • C:\Users\Admin\AppData\Local\Temp\TarA633.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06