Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 20:21

General

  • Target

    02f182e9febaf5479294b7bcd5214928.html

  • Size

    859B

  • MD5

    02f182e9febaf5479294b7bcd5214928

  • SHA1

    f5faded8f44d7137ad4b108e0fc097f500d61370

  • SHA256

    819ddb6595bb2e08e21a8e5a35c2e03f3fcdc580e9531824757e4f9581446cdf

  • SHA512

    170309152ae38b90fa6ad0b2b9856404bbf6d8c10de4cc6e9717ea7cf8a05b7a13f430778ab4541ddf00ce421340f2d49d6120dfefe2fee803a1a16391419d28

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02f182e9febaf5479294b7bcd5214928.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    888883a278c4bbb61e770fd5ea928774

    SHA1

    7abe7163514fcdebae511d58a945c09a619377b6

    SHA256

    d3590574f469ddfc020750eb4cec38105921cbe5ae56b841cccecb5f6305ac17

    SHA512

    6c90f7169436ac8c2e18cc6b3f5f6bea474b931a0632e13f7e4bc39e329e2ee50a2ad25ab7552403bb646dfefd781beb6a04e75083bc02e88415f06d3d37bd8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3a39254e22159b1557591e7937afd12

    SHA1

    f6b7e7f2d6fe0551bc141591fc3295629c435dcc

    SHA256

    c593675407f602fdf9baff123b6f8f710ea148aa76bd4bb0d2de1301e0e9d132

    SHA512

    c229f6b3018b66b00fbf208ebb06d0ab840a05fa1d0032c366673d91ef0ef238d63af43742171b5f27359523db1d0ff8bbb55cf2c1ebabe3331b50de5afa64b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    324ee2983d07e96d6e3417db6d2ed755

    SHA1

    84c43db17741d66b1b8da475914e54f803cb3207

    SHA256

    fb899b0ff6687de607b5baadbf96e7e401b666ce9a7bf1563b75c606a716dda0

    SHA512

    9ed8f9a5bf8750905623dd10e0d7b4e27e9f8b8009e752837361b14428ea096ee980722ed3e66163594d6dcd8d56ff5b545405d5da7fdcf0ef803a6dcd82e7cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44c9d81d78cf87262b9566aad934781f

    SHA1

    2e6c2818458e680d565c7272c245d9c8ce567baa

    SHA256

    ed9c1281651ea69799d9b0b9de3fbcfd35d68f64a38704758a9df70c2dbf84c5

    SHA512

    7fd472ab4087c0f0f6074858fba9ad4c1c6786f0360680f553c0ff62e7268e9f596607f4b8bb5f49954df0d046d1015ae5d58b0723ec9ada598a6a37af2a9d85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2570ed447f2e5826cb29163a9fe742f6

    SHA1

    cf25234e2361671495bec646fbbc538453031c00

    SHA256

    0fceded8fe8bbf78401eaf885caa3f51a262d994a6ded8e803f09acb74e44e99

    SHA512

    c158d6d63a88f696a1f0bfce0bbf0cf1d6b77b24e06d432a3069e4eaf3491a1ef9235199926d74fd78fab7b03d3aae2e08d7eb1e48ba44e512d8253dfc1e8aaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f54761f4c9c5202948430ae95d14d328

    SHA1

    5f5ce3ae36f8416065088b4aa2ce687a6430aa4a

    SHA256

    a309426eb2064ba98efaf38050a434b75fce4f6000798200f5e4f62fc0888a6c

    SHA512

    0895d77cf24e54ae843adeec71bb88d339094d4cce7fe30bd505189411fc879c430ba78602509e2acd26ddf015fa73c49c013790ebab7413ec122f7eaccd6372

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    593fc7baee560ae5e443cee96c0dd410

    SHA1

    dd597a8592b517a6c1a5aa936eecf440b2dd68bf

    SHA256

    8c8c7d79a17c2bf34751039bcdc12ff806e4daf12e4e710c6e6ee4ca85805421

    SHA512

    d2f2e06895db659fec6484edc3b07c58e871ae20bd88a5b46962f25ad1b4d3e2260821370fe8f3cfa451960e554f1e62b7fbe49dfefb2f9b8fcb3b2b678076c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2de1dd75982a955f9cd180aa8e71d86d

    SHA1

    21a0bc6b054b74edc49a349cdcc5e01687ee3190

    SHA256

    79bd12299fdd6614805347fbad5a104598165ee749f0f20ac97025ce2b930809

    SHA512

    69b702813a4bbddb7710f030745e0b349b41545bc54a277a9d83ee669cb58af30aeca335ad96bc79fe1c9c94c845e3f49bb3ac790e41ca99ba1f46e80b077429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52543869989d2c395a77788c09749651

    SHA1

    c4fe42e4e86ac3bf051b26c75450bb4ae1063707

    SHA256

    e432ac773b002876f38924ce3a427f328a2af4574688ebddc603f25ed1b3825a

    SHA512

    b1968c47344604e4f1fcc4ebe5d027b62fa4a66c3206afb91f186aa5aa996d1d6f371d69df841f9519579018e5724f1859884a91ffaa74ac20662537b6e1af2d

  • C:\Users\Admin\AppData\Local\Temp\Cab6700.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6732.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06