Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 23:30

General

  • Target

    fff5d119d7ec3decc8a2949d91654104.html

  • Size

    32KB

  • MD5

    fff5d119d7ec3decc8a2949d91654104

  • SHA1

    9d72ad3b8ec715a432a22fa4269722512e21107e

  • SHA256

    02cd55999477a215aeff45d32ccbdf248364d09c3a03bb314544748093abc672

  • SHA512

    101e917d29ba325f9ed487d4e9e54cab636410519fb958e288f8ae246095eb89284449da263683e5eb5b3a8889b8b988c175b93601a9cfc9919e5f2aa5cb8304

  • SSDEEP

    192:Xc8li2naObFpaR46LveFyO4+mka4Ws89iLx+aoTbZc2TtEWEkfqFTNaD5Z3g0/a6:MEzUEqtESalDNN3Vd/O

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fff5d119d7ec3decc8a2949d91654104.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70a552bf135018bc12d27093b32847d2

    SHA1

    f0a8e793274c4c02c87b875dcc5c5acd09931eec

    SHA256

    e76de7501a30b3b4355029f7fe580741f19a0b7f4c50c92013046cc702a72309

    SHA512

    d872847de859d8d2e1b55af4e9422359d10d289feda4fb59c980d06fccb67d5091efaf0a18ee7b1d8354f94541ae1dba10b2b93594f988c7ed8946d3275af85f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6148e69b6f8453a0e76e1bcf2daf390

    SHA1

    787fff6e6b3051b51326673b94af18eeb6c87e3b

    SHA256

    86058410d90dbbd161377d1dfdbad48fdbf2d674b6fe40f47f0c53e1c71acd71

    SHA512

    eff95b2caf29528bdd7fc02031432d5e9e77d400a4cd3254271c64b314efa0f4e913b39161d9846e279b33e903902c4577ed3f35a0b80197c3b0a652a6945900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c472d0f527f798d250e2cdfad53847f0

    SHA1

    bf968862acdb100dd39d170509763deff02a3c7a

    SHA256

    e0fe1a7950e0967a1311ddd5b785d45540d25a8ac6949c32ef04cd9ce2c0127d

    SHA512

    13b130f4e065888c633844e3bc53e7f6214df1c7ef2325a146eb17ffff18d72787f0ae78322b7158a98c7bd1bb922a561410af5c003557cce1024f4f289abc28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    192be3d4ce43dc7a4299f30148c646c1

    SHA1

    394f9fa20a2e494f4ad536dfb85f711aca05faeb

    SHA256

    68dc7201e4945ae39cf7bf24f754705c7487dbc8c9a6325cf57d27c9c205844d

    SHA512

    46c106dfe16379a3a01862e74089e44cb8cd0d1ff87b84ac1e463312e697882130957bbceeec0260dfb4b61de89b0a42f888faf5c25710aa947a52d8c0f0a751

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b95689cd4f287456a674bef419c7ced3

    SHA1

    2ff93bc34a169a15f09c7adf388594ea6a268a7e

    SHA256

    28ae1929bc0c58c180787d607cb332a32565ff76b7c80b8158dee236040a4a86

    SHA512

    207271ec867648dc9a60d5a803e3823ba2f00991abcb7b5f36de9a049149fee904abb397cea4c1e654bf7aca17870bb4c436cbb91a4b1345293b6bcbb5a7b013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1651fc6e76d8c613d0544b5124a86ce

    SHA1

    1a905b27ffa4284ab0308a89986b2245297de103

    SHA256

    7cbb8e1a48164824a73d535a4e9bc511d2d4cd04ff76ee1520de3f7332020b6a

    SHA512

    b737bed06a136a124a5bdd0a7c6af0c24b3ab4a23008bb9eff709c911ba21cb6876c970be83d51a996debf3d26bb37d70864fbc645fcff27ea3a5e3d805266f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    389b7ed971d671cb0f17fc0ed2309b27

    SHA1

    900aa22d730adb0c4b92fa436ba0852314ac512d

    SHA256

    298be45815b5378f23e16031bc1ce6c9e4f3a542933f52ab411444190dbeebbb

    SHA512

    fe14470618aa4583b1a0cf0f5d85f728a12841fbca9a682e4eb8b12e8fcf59d9f88421002806d9b78dbc42b211a76bb440e16af2e207254fa7071630d0bddfcf

  • C:\Users\Admin\AppData\Local\Temp\CabA299.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA2CB.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06