Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    197s
  • max time network
    278s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 04:10

General

  • Target

    0dfca6ac6b34d9fa65916d02dec69292.html

  • Size

    5KB

  • MD5

    0dfca6ac6b34d9fa65916d02dec69292

  • SHA1

    b0c7fde5bf2948319dbbdaa18815c3ff5a483050

  • SHA256

    42c1a4ff585ca88f0a11aaa6d021dc3a7a1d79b9cd067837a71a4e4f5acd77d2

  • SHA512

    e173ee6b82c34efdad900ba1694b4c207b281a6298fa8b5ab71d8798a2f9f298656596aa931e44b957e2ccb0caaeb7db7864f9b1c80db327119d08c028ddcf70

  • SSDEEP

    96:sYXGGgG2F850fVpwXFy1mfJYN8+9yTp66AFKd7R:1gG2F850fk0s+N27fdl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dfca6ac6b34d9fa65916d02dec69292.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1fc660e98bc55b06a6115a6e0839e68

    SHA1

    443a0cde4e8192f21c84678dc7763f08b5cf7620

    SHA256

    61a9624f9c70ee706ec9882cade643cccf3cea1032c0fb2ccf65fbee0898bf98

    SHA512

    4817bbf61bab92f995fa1b388a178f2c4d0a7cb422d6a83f1e1b5cd755f1718027bf613d7b9aa865043025dec1fa5152c8f1d292fabdee6d0e1631aa1509cf38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5af8a693e517435250d45ed89dcb314c

    SHA1

    86a7205887bc49374e1793a7bd3f10242daea69f

    SHA256

    9f79f5f0692350fd65e2f1658645e3908174548a3f6c77267cb1d96cb5eb7905

    SHA512

    5129ddd900eeb48924bb0e8d9b21aa6469a812b8fdfe019f37a252a4ca486a2d7ffcb0d442792b94b9588cca1c9a20681974b566a71ba92a4f3fdb8914640bda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d6264a0ce96a3e62a4312650a77ae83

    SHA1

    f67d32c77cbf12f8196ffd89de6118ea12af5a01

    SHA256

    db1c246d876d5d69d78b6367e3facc48ce61c2e2bf2f48b0ca3ad4ee8df212a4

    SHA512

    9e23feed992dc65f661abdcc69270e702e13994ceb1bfe44a93f01762fd98bc141fbff1044d0cb48663f69bcecc7ac5d49542e15a8f9ebccc0e597383d243501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bac4d17bbe1389dc599ebcd36b4ee8e6

    SHA1

    7a9cc9bdbde817830cade5c315186bd32ba7cdab

    SHA256

    4d0552307a92945908995bb6a6df30f32e8b0b3f4e4555f6ef0696fef3848b47

    SHA512

    1cead8ffdf37346a78eceb813c5e52374a072d6b3e675bf9dfdb87e24a9635d39537fc03e54c78158a2171ab6cf73e0a1bc47c9ef2c1fae58d0f6bdc0caeec2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6ed38d0e49ce4f12428fc8ff547d2f3

    SHA1

    757e062e97d67286ba35b4ed6be98c66fe83d4de

    SHA256

    6c1cdb97558af28589ac11338e2a3e40c950087bb2e131db4ef8aa8529e3eee2

    SHA512

    7a7861fabdc1b8956a9d28b2418802f409f5f35476d7be6bdb35758322053fd7c3177c8817d854899df96c8458ebe4140d2e45973f0517597fff797e41d1dec6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03ce5d064b996d77d0248f6baba7a173

    SHA1

    5ed198afba5b0a08297fed5916563e9f7faf35dc

    SHA256

    33df976210c65027ea0828c35660847b9db8c535b2272d93c34138557387734c

    SHA512

    f21991184d441697455c895db7dbfeb67764107359b75250d3a58d567e377215e96933728eccda15b9afe4494f09662e5e661d75799b47d28e7ea69112648aa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    840136317bce5b8df09f9803334c4a8f

    SHA1

    78983362a78cc4a5b759657581281ce5fde66af8

    SHA256

    5d4a3d0bca06ddee441e031530646516d71555d5c340cdc35798aed85ca3855d

    SHA512

    95d46395c9215ce6abfa12921e3fb43be00277048da76d5ede62a31d84464e622f75353e992f0b84dc6c7e5a7c16321816d9138775819d08faffcff18363866a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba65fe578b9c6069a6664eff17ccf8a5

    SHA1

    0fc7923305de1cd206877a0c77151837bce96898

    SHA256

    04ead08dd92b712d5008d018bbaf45b641efc5f0d8491db3ff13472b02638caa

    SHA512

    b3c0d4e93b2444db08af8307869fea58d4618f9914bdffea5fb5878e72b530790f2ac2e3d798af30a64296142154a5f5331fe7f5ddbf04de1d80820769657bff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba676f6abda724dddc4159bc3b3281b9

    SHA1

    fb62de60ee12ced2ab5daded70e22d245cc8d8e1

    SHA256

    b27c934e9c57820f858c3e30fb4b91aa76ed616e81dde355da1e35bf41a4600b

    SHA512

    1a02816b6d777c2ef71829037aa1c89f267d2034b01280469c125b2f418c0f2f852c32900d6deb050c10497846276a05598160b41ddfae19139e0e8f5a675029

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0e3f4c7cbbba28b99bfc146046ce191

    SHA1

    bebf8584098294e7c4c720f44ea11d6c5d761f54

    SHA256

    499debccc504e84ff9f932838ce82eda610e168335a2813235b50120b8da2134

    SHA512

    2a8fe6e262b7240ed65961785038f41733c21f0c98a0ff278e40b7c39b99bcb8329ac8197dc83e35de6245484baf9acefbeae0d31db9f76ef3d299c27fdda074

  • C:\Users\Admin\AppData\Local\Temp\CabEADE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarEAF0.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06