Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:04

General

  • Target

    More/Multimedia.htm

  • Size

    6KB

  • MD5

    ef35e2d5af7c4db14eddace8710befc7

  • SHA1

    046073898e02adc5a7adde2de0969078ec917842

  • SHA256

    e56ead00f16bbe620a3f5bab2b0742c23e921767abc4c1ec71bcbe5f30ef33cc

  • SHA512

    2d172849d283a9c544df18df49432e2e398d02a436c88b53c0d6f2a8e48b9e30c34c433aa2c1b00f4f5494be75f9f8dde5cbaee88256fba686452eae4701c024

  • SSDEEP

    48:bpIE8S2+bS9fLQ29GGYhoUKQMdAzhQabMgokeXCAmu3xTcx9Mo2ADry+AMkREE+Z:IShS8peXCupt+CmBHIEd8ul/8uqAhv

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\More\Multimedia.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71ac84883a6c389360c78ac36aaaa630

    SHA1

    30b8bf51f1e73323b3b7dbd330aaba735cd07406

    SHA256

    4a4d71ad43a81c8bd0d6333b2fea752c0b8266d32e0d1382e51039d96669a36b

    SHA512

    5910d5307119001a87b48854d7a6abea3aa8468355256c30e6a2678b961f0112e853afd5c840c14c1cda9a3d7b84ae93c20c6c43d4f9418f0c4620c2b356da34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b8674df895b74c87bf7d4c85837359e

    SHA1

    07bf1c7f6240132db876993017a57a388a180e49

    SHA256

    23cc746301fbfa61644a6a752cb0cf14555fa97aa309deefa56e893f4e044c95

    SHA512

    e331ea9ebacaa07cc0c4e59b2c25887a052bdc6aba0482102b2a4d99e62e1844454016e2f1df711f11a036ef6353145d806801a3e7bb78f31131319fcc80d5b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef65f6332e05ebf40e06f8b5863369a5

    SHA1

    f1af070687c1361ce36c8627d7271ef8cf7f51e9

    SHA256

    ae63b6b62e5fe56d71b5a6a3335e3de875eca16f028bad35d9510701e2e914e2

    SHA512

    46255558e7397f5f6b7088cca798488aa113bdc0cd91c590e9ecafadb698db0d5fca65224695a8639eec076c75b102151283e5c517d655baf67c3f8fb719fb79

  • C:\Users\Admin\AppData\Local\Temp\Cab8366.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar854C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06