Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:44

General

  • Target

    05f9a09469089324e48fd7f26dff2468.html

  • Size

    3.5MB

  • MD5

    05f9a09469089324e48fd7f26dff2468

  • SHA1

    8556e27a9eaf1368a4ecfb75e7a881f79625fdd1

  • SHA256

    4ad373230fb6273a108a10295860f20063c6af6aa6f8c16a73851b32605b021f

  • SHA512

    a6d8fbc81899de7bb454d5b49b7adf31c44858c1d421e80439bc3babc52bb44563812e53718bc5b28429fd9bc759925cfab0e733049c0299ff55834dcc5ab73a

  • SSDEEP

    12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NN+:jvpjte4tT6D+

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05f9a09469089324e48fd7f26dff2468.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc253f0153427fe21910bee3863302c3

    SHA1

    5e7d9dd161a8e3ae83af4e48a4fa09c43ae4f1e6

    SHA256

    1245cca4f28d552f7dd630bdab70a69101b9327a7c44f9e2686f1883beaaf7da

    SHA512

    1c31a7e3473906b448cf7f3e62b69da882f21d2f580f834a9d8f6ba408b442edbd9581185362e68bae461775fa5d62606590dd84260181b28a46f3d12e2c5aef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59cdac5ca75b6a3dcc95394cc3053127

    SHA1

    539b20c38c4f4e79cfdc4f52bc8c454bda2430e9

    SHA256

    a3fb1fbc4d871691a52a6a1fcc0f240821496861e4dc47b57ca2bd546fe20bdd

    SHA512

    e65d8f7ca03bf359771f2943afd1def44912eb3ce4a4bf26c28e18594bf8b27228b72237ba394178578063727ab7a0f4cfe6fbe8d2943ad8035d5e10027035bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17af072d0593867adad7f58cf4359b54

    SHA1

    3d6b38688550d2bc9bb31ce0fbc1050514903be8

    SHA256

    ae693ccfddddf39a7a1ef0e4ddb69d6d7ae53a1ecee302313f7ec697231265f4

    SHA512

    b79d9bdd9481b01c3ddb0d294df11882358e42ebb83ad6754a58d1abc88df28a65c0a489fa4767f4d9ed2c9485936301a667ddb7cd3194813cf1c63712bdd37a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18202f3e1f1808897425d4019fd43e4f

    SHA1

    eb7554dfbb34a1a55597d2367da3eb8d1993d7f2

    SHA256

    be922746613f2f28cb6ee96bfd09b963aaa4cd06e2a3f27dde113fbea56c53f8

    SHA512

    636682317751b8b202dd1390523c3d9913e5f701db608b58452a0ea661b9c4ccc4f78ef702d6e2a477381ad308a51d006955962a7aab5d04cd7ef1a5ff14c3c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e06f52fa85045b64cb9d9aee3e289c5

    SHA1

    f6b0c9b737b6c77ddd29a79d740a34d4e9583d3d

    SHA256

    8a418fb83ed4f5da0458e1717c10298b9bab571f81c9aada30001d3cf04e4702

    SHA512

    9d4d7defcf84095e857d552fcdd4a8d87a8ff658e75e46f3cb366597b528b51987025f03c03df23ef01c8d72e70bfa5763bda22be4526b3dedee397c8af441a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c156d906662cdf1b1dd94bc68fa2d499

    SHA1

    af12157c1dffe12ad031f18e8a2e9d0578c39956

    SHA256

    b4400bab01c32d01acdbcbf45a06ced2b9e45222bc3bb9a7cb6fe1caa6dbb3f9

    SHA512

    1577f843f0900c9b89f52416c7e287d4db15162dcfd9eb0cf22e23b681d5359d71e0b671d3439cc649f7ef7eabff4cb9d6e65d3e4210c936107d4d90e06b87f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79971478e273d0bec86d38012a09001d

    SHA1

    9b2427557f4e8f950930e03fc89a83cb3e95a577

    SHA256

    71068c90479c0ef8c0c67e5128cf05efcad13916176f3c7eb6b9bdcce600976f

    SHA512

    49d030e9961ebacab0761f41b14e733e980bc43685da05fbb856514c4deb634c62c24a155732f26d9450c43a19d0d56732be267d0a4893ec8186a27327de43e8

  • C:\Users\Admin\AppData\Local\Temp\Cab2001.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d