Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 12:32

General

  • Target

    189bd0abba900b8821397cb44061f0af.html

  • Size

    6KB

  • MD5

    189bd0abba900b8821397cb44061f0af

  • SHA1

    74924cdf809ea76a0b18464e3d4662d7a31a4592

  • SHA256

    e7fe75ce8cdda2d647ca7194f0d67027350ccc739dab55847fbbcb0c55ea39a5

  • SHA512

    b71b9f5ddba6ede257fe4c558d50eea5842bda2bc2fec2615314e25d244a75fffc24302ba7f74bd4950f0e93430831235a716758095282e740fa5f5a8f2014ad

  • SSDEEP

    96:uzVs+ux7oFLLY1k9o84d12ef7CSTUWZcEZ7ru7f:csz7oFAYS/pb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\189bd0abba900b8821397cb44061f0af.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa985dd6366d82359f4a38aace4985b4

    SHA1

    4f48b09952cf6d4f3d1293e9318c1404f888a04e

    SHA256

    cde759bc88c67403ce61a7ecce757f641c497b61038434f3aee4d5f0428c3070

    SHA512

    763a1fa12851cc85efb30eb30391c853f04223412430eb2ae316b478116476a8292085eda96d06587a7ddf8b83687c04d4686ae7f370a174b062e9d988ef2874

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b683380a7a99a873302e96a9b0af10f2

    SHA1

    dcc945faa3b539d626ff82aeb81a5c73fc3e07df

    SHA256

    70b68dbde99d7ecbaf887400184d23f4d7b05532ba0bfc7c6c85d23e677ab1a0

    SHA512

    49de022697458ebf8ef5c11c7401acef8ce204c93dd7f8835ad39831a3b8a7762d1a11bbf624a34866785a18ed840adb69ab6273680014e23b3ee81f899fa3fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc91ffbe5ff7efe7dc88bec58c3526eb

    SHA1

    adc84c10651455c91128947b0bd3ee87e388d577

    SHA256

    c62134ab337705e53c73e745c8f96206b9dff161d71d9c44f47748577b70cedf

    SHA512

    27e2370f01e3304ae341f896c5e8d6c2e1f7b906f331923bb6f0a95ac87ccd2cc5b9e22f43bde65a9b1e40130430a4c83ac22f5710b2db54ed1dda9f8489667f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba9cb756adab71e15df20cd22ad0bef2

    SHA1

    78c9604d047880618a1406081fab5ce8b7067402

    SHA256

    3c6800696442830a6d4ed8ec1f31b5e6930553b26fd912ba8ca73cd1e216bb8f

    SHA512

    b9c66e081711d7419322c665fd38d77d38feff2ad8dc785bfad72fc8503bd7dcbe3d5616894c9fda7c81a3272e4af8f5cd72445e1c75878ce4ced68e2902a9d3

  • C:\Users\Admin\AppData\Local\Temp\CabAE7B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarAEBC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06