Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 12:25

General

  • Target

    taoaisi/admin/SDEdit/HtmPop/about.htm

  • Size

    1KB

  • MD5

    06d1087093e48184133e245e596a67d6

  • SHA1

    e1a63c80b78856e51ef91211a66014f446089d48

  • SHA256

    88403c9799f2a2bd2c776dae5b83ddf778d85870cdf668857ab19fe697f58b27

  • SHA512

    2a144657d2e5799c6dcc2caac6f80ca0c4e1202da584d1fdb5c35c2a9e2fab2592f499e6fc8dec4ba77cca73cf546e10f1d560ce0c13078396eed107fec78741

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\taoaisi\admin\SDEdit\HtmPop\about.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dd40c716d48f36c9927838a6e4bcf2a

    SHA1

    8d1c9e201d715ae42f7bb34b9b7042185bc28ee8

    SHA256

    63ced11b1edac1485e066dc84d3c812af96267c426bc9f6488c35e8478b08ba4

    SHA512

    2518ea005bc01dd8f7f73ce41083c4aa1c42a79efb0575839f3efc9c8d5ee11a246b400bbf321a9e9ebb51d69415c0e9b828ff0b0207830a453075e0d5a057ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66b8da797e6a9907fec017e3390e5bcd

    SHA1

    dbf9a036a9542d3771ec738d695361434dacb71d

    SHA256

    b51cddc7bf81eec57164ce15896ddea930cd9a91837f8d4b2b6eaae0e98d53bd

    SHA512

    8fe86a30c59d8e2c9f59851de11e887c6f246d7439b4cb5ab111e49611de787a7569663d3aad3a85e13e321d74a21f76ccbd5c5296d819e3ff45dcc6c3357c9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43d822c6a35d89837479212d00f5353e

    SHA1

    fe9257920a7d68a8b2f4c5b58cdfd81a43631cbf

    SHA256

    ade0225e02b679f86c56023d411270f12e81af8b6475cca135e8f9c918dace69

    SHA512

    c77338c76c66995a467a7ae7f92b764b077c77441fb7228e65676567bbd5afd26b3dd27517257d738a8ee564c56e9cb450f454a8bd23144cbc45ed9703900bcc

  • C:\Users\Admin\AppData\Local\Temp\CabB4E1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB5BE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06