Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 00:42

General

  • Target

    08dd1d8854210537a40d0db37bb75390.html

  • Size

    53KB

  • MD5

    08dd1d8854210537a40d0db37bb75390

  • SHA1

    b756f33dcb928dd2d82ce42748af14c8d91e3c1c

  • SHA256

    e572276884ac121986ec665a8472110957d7d459b5ac56db683b0e7e7d2b878c

  • SHA512

    adc230651d7765e929d2759242a85509775e355d364610a2c85321aa5d76424fdf77493a9fb34ad9e1ee4cfde01111edd1d52d60dd78838ac1b1734a3e8bc8de

  • SSDEEP

    1536:CkgUiIakTqGivi+PyUIrunlYw63Nj+q5Vy0R0w2AzTICbbkoN/t9M/dNwIUTDmDB:CkgUiIakTqGivi+PyUIrunlYw63Nj+qg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08dd1d8854210537a40d0db37bb75390.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83b7a16cf917d814f41e19849abac657

    SHA1

    8023fb9772e2544ae85ee17459667e3e5a90f0de

    SHA256

    8b486de579a54f2ea75af20cc34b2270dced839cb61a333b94f3a1b845b8c47d

    SHA512

    8afd824ed7584629d460be42b96c0e62bae98545d6d16113f7f434e0ff500c713b09ff50490424189c326899ee927a91dab3ac3c5c3af33beecf6f93e54604dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b7f3f7b60c3ae2f3828e8ebcfa2dd9c

    SHA1

    874a3acbc02f54648b008ae07fb9ccfa5fc978d4

    SHA256

    7b1c2941f4639bf1be797cc340c6ff7a69f4ca7dabf6b67955a7742a2621588c

    SHA512

    dc7c09c5174eb7ec5368d7c86125c0ebf299edd78e0c5ad53d027e4cf3c5262cee3560839aba6428f3f5a4a6f48a6315784b99560a5e3c705bddd7b00320dd08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c28895038f6879c8a83dff60f898d200

    SHA1

    759c5c4ffa4be35c3f25672dfdfb02aa20740c30

    SHA256

    5868adbcb2b5dc5f61a6519d562dec8fed4647b8011c7f0a2fa66038326c16f1

    SHA512

    8b9ea53f39aef7522968ac34d17767fa43a35709b1e2d2d05da6abff8eb7ebd5b1fc4359076bb7a7ea40cbd8b8d6d00188b61c16db8a3dbc932897fb3fcce8d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    755a370725a6be78fe50e04af2e0fdc9

    SHA1

    39d3a784d5936240ec54adb1f0466a997c43fd0e

    SHA256

    2cc0b0a41f1fb7a5f0b2469a2f54a2e41e29e0b9f66263f463f740c1661d7565

    SHA512

    9ad1a3b3bb95bab8a20c4eafd7e7720e3d5d88ffd33ee5b3dce9a56e758c23d9dfcaac8bb541438368cacfd580fd832379381bd39df3a2d9cc9d7b9bd6340a37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80ae8faaff09b8e48d77a3566fcdd967

    SHA1

    cb54912fa4e9671bef5155bdadcc9295b5fbfa3b

    SHA256

    1e1b6514e74fac402faff2da5e23bdf35f7ed8a39ca869294643d16948a93878

    SHA512

    1a7ec842c9db3a96123a380dd2bd96f72897beeb8219f0fe5e86ed6d4e44242bbf11c2cdfd712287138356ac3f1a17171a6dab6e401fcd5aa0884cd40ebc4566

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb1b89ed6a45ccceb63826caf7231790

    SHA1

    ceed42f3b15f8c37ddfe3f78045d2da917fb884a

    SHA256

    d3e044782563c6b4c11b350eb2113a0c206ddb7a7e8e24c40deed75a83780792

    SHA512

    78a6d7fcdeada8d292bfaf2fa8ab319fe49476b20c152f7268572f83fc30b004933c5eb49ac8b60ff7e6f52945e40288cedfb9c606c503c355aaacf1b2d67510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00d1e440ed91f2b70154585ade7e40fa

    SHA1

    04c1c623ed22a4323e9b6f89e74c9d4bc5551281

    SHA256

    e8bc0c97def0e0064f1b989b4776a5a7fdb0b8784d8b68bef596a45419f30c06

    SHA512

    c27fb852c1b19a16481ab9d148032a75cda75f8a8dd975d28f9a93ea5e6cfdc917cca7ea1ce71531f7fbc1d4ca10ed19ffe7d27f14bc4e0de7a477e6f41b2a37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e28cd1def1e3e2a94e012b80b9cc8e13

    SHA1

    10cd764bdda885c587710da83f855ded22c0d094

    SHA256

    612000ec3e6d4ed3298186d9d8cbdba94ba3c7422c85d2376469615d431707e6

    SHA512

    61be2578c0cae5d4562757bd55e84c453e5b8f867015380ebee9223b6ed1301046c6d8de6ff96bc5c31bb9d1050b9fb15af975d1a23e29e8b63c3e9e5cb5cced

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    185da1e19a9d2d7f33f9863f005788b5

    SHA1

    654c1182c8044f43fcf78afbaa8acf9b987ba846

    SHA256

    e76287d1554f8802e2268d398e513cfa8ae62162cead27d64e02351efde0a4bf

    SHA512

    fff4d06dcd0bf5fdbd29bfe73f9ac34c68cfa4d785f7b0dcf32e692238794bbf6615bd646d8d2ba813ace38168148a2a027d86df959da4cae29416008c427add

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    391794e8b12d0005368f7a1a265941c8

    SHA1

    6ec1264a525fe08bd67e9554ea99335d1ca207e4

    SHA256

    8ad663502887569cb1e23620007384c389ac44c3b65ceeb3b8c589885dd6ab06

    SHA512

    4a1fb082d7c94dbc542aeeee8e8828a6f0a1a82df0a5d57f64cdbd39d1677908a826d31d8a84cb24f5e161e015845474630a53f2e516dfbc2bb8333a00bae2cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\glossar-js[1].htm

    Filesize

    706B

    MD5

    67f3a5933c17b3ab044826d3927d0ba9

    SHA1

    5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

    SHA256

    97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

    SHA512

    03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

  • C:\Users\Admin\AppData\Local\Temp\CabF193.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF241.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06