Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:47

General

  • Target

    sample.html

  • Size

    22KB

  • MD5

    6b14e99d36a29732239355aa1c44e248

  • SHA1

    6a9c9caec35488c19effb81278e651de31525e5e

  • SHA256

    dfae4b482271699592adbbcffafb47a9bf8047fa39f5c17e8e5bfdc6dbcd19f0

  • SHA512

    c7ce56ba2f2e6dd1e3771ae63a9c7d52cff9f51bab466e4518b48c831f472992af7977a8e70a752c7138cd9735ce170bb73fe142b2219a820e6ddd9d780b11fb

  • SSDEEP

    384:wSFpvsVhRERIN9Ca9jSD1gqs67xJdH6/1RFNvMotdvu3hl:wo92jiINAa9jSD1gqs67xJdHoM+dvahl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4bf2bbf45e26520a4f3a4ac4da134f41

    SHA1

    04d22da5b192759bffe8123ed5e23e6ba3c61eef

    SHA256

    5507465b32e8cb6f06318da3ba6a58a97608d3060fcca643c32f55bc7a8e4455

    SHA512

    c22732e458d6fd428d790c5c6ea68a4d0ad4196c225cb75526eb8da990d7214ae907c7e058775d9c31ead119e69ce50e15fc180a22624f05edfb943413e27b95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ca76b3bba6940dd08997de769556ccc

    SHA1

    006544097cda5b3ef966ad1bbd0090bc4f798271

    SHA256

    e5bb642a4c467963524868cac04b39016eb0bb52e31c9cf83170221e59cdfc96

    SHA512

    6bfad74c9f99183defe60827a66f848d5f9d19ba0f691dc25435154ab53824c94624371ba196c9fd68b4a3c0baa27aa80d80eeb4fac94dc370c55f1510377d04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3850e670272ff6acee298726abb83114

    SHA1

    5dd65a13ad7bb806de5099fe2bb531b1cb51b49c

    SHA256

    da44492952891f1326274978f005f74acce20a3c6887a4e0fd1d6e760140c04b

    SHA512

    631b47bf2235f587d097c576f6d3da1128a315e2971894b8a6c691419c6c299766d3166c883aa5de5e818a4a932ada727aeb382c1d372c39b2f1c34c5704e8f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb319f3ef08ac09407c409558a7650fa

    SHA1

    7e8fe180bef17b92d7ffff259993f59fb1275246

    SHA256

    d27ec240f5bb35f8254aa9a6b102e253e04a9eac56de14233a802e5d8b1b9437

    SHA512

    75b1bee82f0d4f673c6ca9ffadf987b66ab4eccfbdf97b7316ec96fb294268dffb22a7ddeb7f856982361b568d68606dd5e165ef2d3c2a6a17dbef06d567f123

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2a319af3a71df23daf727832b0f7b5c

    SHA1

    5bd371c309f3b6c9f9c79518ff3206ed68aeee32

    SHA256

    d1728fbf62495ab0b6f2bb703de5b498e0154c787948d5a56d7402fe0d086f9e

    SHA512

    6c65ddabab32349ecf96759ddc3546ffb5e8bfb75dd5eb3644b904bb1c708a6047de68ada569cf78f9fef7f7767e1b2d675c16319adc43286d7575cb0797d808

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4104386bab9ff75a56a4ce22333ce165

    SHA1

    4c49049373ef60e42ba8074b2861f4a9d648f72f

    SHA256

    f406cb69e4d6df85676b7e6be8ac8bd34308b8c90dbf9a40371b9b2f8d2ba4af

    SHA512

    7cb3d85839651499121f04be34b52d2bc16784bc47d8c38495754df2fb994d72dd99efc05dc39bc6cd89ea5ffe364091aba80f17b99082fa7ee049574017e734

  • C:\Users\Admin\AppData\Local\Temp\Cab15C4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1653.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06