Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:21

General

  • Target

    1cce6784b7ea75fe809dae4699cc3074.html

  • Size

    35KB

  • MD5

    1cce6784b7ea75fe809dae4699cc3074

  • SHA1

    aabb8a8127d95b4917e459203e69e4fa7f504ed0

  • SHA256

    d89fe80d62ecccd53eb3537ec61e8cd6154299cfb66ea203ebd6ca13f6703b0e

  • SHA512

    d79b3e1314f5e23b496b84266126b7435faf879159dfa9cfc974c81fee51bd2d05c4cdb41e0d2e7fbc1e4b513f2dd3110c2d60d1b6c30828b73ef6be5649715e

  • SSDEEP

    768:zwx/MDTHOQ88hAR7tZPXxeE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TOZOF6DJtxo62:Q/zNVbJxNV/uuSe/28rK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1cce6784b7ea75fe809dae4699cc3074.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    73bd5eabaa5ad216cbd77f3d9ab494c6

    SHA1

    792b2e0b037dfd3b046413789a4acd6e4657d42e

    SHA256

    f6f8993c3b1e4fe2d8334c5f7acdc7e76156c70170e11c0fa322613f93e42f63

    SHA512

    3d3b975a261287eaf517405eb66b00ade93e83dfea4ec6623f9431ee40d890c7d236fed479ee2bbffcf39829767f441f6a19348516fc3c3a98fd686a8d8186ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57bf5542742e3893e65014f199e0e019

    SHA1

    a48a3fc9b03475e117074723da2cae180b2bf846

    SHA256

    5a432f815d930f8a95c61176555808681e29e37b151ece2c2cea5dfcdb8bb763

    SHA512

    ecf15b41a649287b8c6c9e0c0f4d8dd3123f17a7f4a55836e886d709b534e9b6b2d9eabf0744a2d3948b1433ad95f7d2d4fa9c75492c725381403633f8b3bbed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fed463acceddd25e956b350debd9a1d

    SHA1

    d92f4c31b0f0f856e6f6ecce3a0f6996c4821b5e

    SHA256

    b43d648822472b4a5682f6223f4cd18dea8408c1595052bfaca1e48b2792ef32

    SHA512

    fdcbcfe24180c217a4105aad80af77ceda59dae88e11c6e1c293eb0c77d9157fe8f3897575400027663929056d09000f4f83a8d31abc06162d6453fa956663dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a19724d91df7da6f90d230c3fc76a477

    SHA1

    b839762f3a9c94ca7538625d4617fce695184e1c

    SHA256

    09fa995eb475e309aaae4cf8d123f784e2c5996cb9d5ffa452c5e192574e94e6

    SHA512

    cf83ca21bc7d27352c6751657ae0b35a88656dc0277670797cab7b58fddb5738b4a03842e9291ec611d264f80dbd58b30e88dde2b9cdf6aa7f3d0ec8d97a8097

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d484702ca6a3d5b42350cd0566a015cb

    SHA1

    987a9fb308d5d67ca24e22ccb4426a20277c160d

    SHA256

    25b5eb00dcdbb9aaa4002ce1016acc7dbe1caf728ec9d762fdce554c34fc9fae

    SHA512

    8e01040cdb9a581ca3fb08174faa267059f69753965de2b5cee16bebe6b20f3c5e1de502fb01777819057206b0cb537bde5936ee97946e11d3850d3d6f801c53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f214fc1ecaa7ce1dd3610d0371e179ee

    SHA1

    d553c53025ef3f755e39cb095f4d299313cfdec0

    SHA256

    21f4efd9aab53fdc6df679f35198af03ac39bc5994e0f68b2118403eb948c093

    SHA512

    7df2b7f15cdd6dc2cf55647501e18b4c16b24122130200612868f64d1681a62ebdcac93fcb30ad92151593a44b29bce484860e9eab02351726ba283127fd2cf3

  • C:\Users\Admin\AppData\Local\Temp\Cab3C58.tmp

    Filesize

    61KB

    MD5

    48ec55ef446b8df810ac093e7523993c

    SHA1

    c578ba9486b177590d8dfb5122727fda52a8135e

    SHA256

    4c9ec4506978adbcec7f7c085201ef78a35b362c28a8643a1c4bf583d5eef833

    SHA512

    922dfdc38ea0433e84288d622ac0df27459f028f7f0b517d8921acdee2cf578acc73c52e5c9682dfcf0ec0f391b87d46cbe5f737d245188fe2e69057153a7a38

  • C:\Users\Admin\AppData\Local\Temp\Tar3C5A.tmp

    Filesize

    38KB

    MD5

    0772063196008dcc4c9a6222eb1caae0

    SHA1

    15a4f5d2e5867a4843ddfaee418fb65d590436de

    SHA256

    a57d4befb4a25f26712e8fe48e52e997d5dd3f5d3b9831b5e90ddf59bf68abe5

    SHA512

    b455ae5a1c17672fdc172b9dcb586841c17df2f6fec83455528670051b3725f83ef6c4d6a3e08180ce0a42b4b4d4c74deed2b9fccdaebffd56d13e57cbeb3abc