Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 06:41

General

  • Target

    114a7ba044de2822b09fb41185f305ba.html

  • Size

    11KB

  • MD5

    114a7ba044de2822b09fb41185f305ba

  • SHA1

    ed3d4f8f1dc60c5af5ad8e04ef85c5b303dbfae3

  • SHA256

    e84fc6c2b3d519c596c0cabb83a2c41fa4fe73e7451c78069de5d09c41b90082

  • SHA512

    5be46b2b9dbc98b5f28d2c4f47cfb4fe52a635069ed7a016e1a9b4fd8fb8dc250e43178523e6bb2ea9a4cb310fbae6455cce7e0c478d4aa02e0f5d74332a0a0d

  • SSDEEP

    192:2VqlIsr03zazP8k/w1wvqyzfBzZzgnz8zrCz3zEz/018LOXuBuLbdU8d:sqlIcu2d/gcDBNknwPCrIT08LOXguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\114a7ba044de2822b09fb41185f305ba.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    552132fdf4929623140660e9f1d8728c

    SHA1

    b30c9cada92be3e25a0ca2169d4f19f58a3e6c29

    SHA256

    7d1aef572d7d513e21abc4fddfdb17568b9dc2bd829a0a9f423857ce673ce1ed

    SHA512

    657faf1f3a8b1d47f003a43ec1fa63d61c230482e27c5d3623eca477f44c0bed99a60631530d8ac01041c2d021ac6907039f5d17786c0518aca00e90df5150d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd124f734f2637a2bf09440ece2404af

    SHA1

    7340a9685ada1e3924252d9cb89a068d9ad912ed

    SHA256

    c11421b1d83a5772a5a824cb4404d14c03bd467bfcdeb778a221dcf5028fb063

    SHA512

    6c40d8e23be625187529bbe04d6738498278a61e174557e7fd276bfc8d1a95f9b248f2f179cab52529731573bbdfecb5074e717bf4bdd9a02b2b906c7f9a122f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f8f226a4c6bdf9b5b90cea5e07e7d5e

    SHA1

    5d53e6bdb9bde12b392bfe4e97d79b26ffc5d2c3

    SHA256

    b01a3a458f221cc9acf88940d17ba0aa705af5cc77c9577a2f9a9976d550e328

    SHA512

    ae9a4bba7135209121013192d1e0a3f89dcc11282bbeaf60c07701c88843102db9d9dfc087a14fd1b3741f57c61bbae29303a477ec906a8a2fbfa785002e96a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b9034f3d817ead24b6bd2173071984b

    SHA1

    bdaafb0312fed95528acd885b6e7f3d845128265

    SHA256

    816c3ae2d063cbbffac794e9e6e386168605ddac089dad97c888941c768c94bf

    SHA512

    6d0658a235f5d2b2db86729a28abcb467b46af933a4c5c848f4fe22d6a01d4d0198749642a35f2dd3d510759e7a83939c7cd7368d4fb2c4570d44b5a5837016f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    423b911af901516ad8f71c5f2f032d8a

    SHA1

    cc6859e896c274cdfc8df8ced42221e0c93d8b14

    SHA256

    d24ca4adbc12c348f01a388174f392fc1c1b29c3f4f66f4b6b4269557ad10e0f

    SHA512

    c5d2b2207b5855004c063a3e53612be5ea366c395b3ba76b61e51373e61d435c125568e49a547c4352b85d3f036d0cb014febeb2684f52c1721a4700d8236a7e

  • C:\Users\Admin\AppData\Local\Temp\Cab6A2A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6A8B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06