Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 18:12

General

  • Target

    0022bc6a8f14a04752bb3f607c505155.html

  • Size

    28KB

  • MD5

    0022bc6a8f14a04752bb3f607c505155

  • SHA1

    391baa6c7627fab12bd5dd22bc18217a3f23df02

  • SHA256

    6aba9dac74f829e8e7acdbf796733f41076ee16e1f1a0bf1b36a02c062d7f829

  • SHA512

    e03b40bb1c607d1541723174fbd5547f065d8c446dd4f453b982b7c67875c1cf11a7a300eec920ec2881d338cea73da0e757e084262af26e876090115d883357

  • SSDEEP

    192:uw/4b5n5u7InQjxn5Q/jNnQieMNnyznQOkEnt3nnQTbnZnQ9e4zq5m6ARm+/3Qlr:VQ/onnEEm+OSo

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0022bc6a8f14a04752bb3f607c505155.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4db1b391f2efb8bd3bb417c8485ea453

    SHA1

    0d70999b5555118a95bee4bd2786be852df2c172

    SHA256

    50ab3489ac181bab93931d4bc1bb619e9bfed577a36ad45f84b78ae2e152d79a

    SHA512

    55901915aa83cc6bb9968feda2544c3538edcaa5bdf4aaf7d941d2070fdce7f56a4055baf275578e305e67586ab2c8a9d308e771ee0a0cd92251d2ceedb22f6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6596d1a39d3021064b77942ef55f8350

    SHA1

    8695c54a918e78a94af0234f410f20620b7624e5

    SHA256

    e6f299e1da5bb6be61ff54eb6ac0ea3bd12ab9d2d5263ef93dd9c56c01beb74f

    SHA512

    1a036fe3cd2c3ebd930e1e26e9bddce842d7eaff3d1090b25e700c121d270726be3634aac76c2b33a2da72e1bcfdb13e57e83f28d414cd23ce553c506d2a2a67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da99f726c58b135f623e4e6de1523992

    SHA1

    d26b19bad6d54c982b413cc0db17132721bdb3d6

    SHA256

    0da38b930fd5b80963da7a5791c52aab5fa7d1204813889ae288674114357597

    SHA512

    cc10f4cadc49ef0868d4445f2413df8da135a2d8fc90ae06d0d64d60f449b37a27881bcbe3c80154266399ab155e1ec44f4c7db81f01a664085072cc702b3d63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9436da7a0579e8e9af6fac3a47d39599

    SHA1

    7d5bffaedee5134a43880d229e707eda668e5605

    SHA256

    a25715494e567da085e72906bcdb977c30de8d334e611fcbe5defc5d73726909

    SHA512

    2fed52421e0fa1dac1403d292ac8939979ebccc154111ae2a3f3e7f5f2312c0e5d23ea73810a865076c73cedd15ac38bc8c48a3de9488a4b6345bb52fbee446a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9af3d49cf0ddf7e06f215e074ce4c83e

    SHA1

    7be0ce7756abbe325a115547b2b24b18ff86bae7

    SHA256

    aa1cf2eba0edcc9370bd8d8c9837efa01b1b3af273ce773dfbf3db967d745b8f

    SHA512

    01b083c9d293754257f930cb6a4c7d71b4185af57167cb8627f63f53db0e3c2eca54f4ab1d8c5679084cc7967650397b2da0e70e938643f29f337decbc056f52

  • C:\Users\Admin\AppData\Local\Temp\Cab11CE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar125F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06