Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:59

General

  • Target

    23a642a13d5623e04bcdc826cb3fa191.html

  • Size

    7KB

  • MD5

    23a642a13d5623e04bcdc826cb3fa191

  • SHA1

    dfe86d6237432e3575242791b17c6b23c9d38dbf

  • SHA256

    cd9551b2b58176f4eb16ea8a7cb11c425e8c6d474a284444ad6e160d7448a2db

  • SHA512

    50409a7a000708268685b70f908fddedbf013873e103e01eff0121ee2a845c835678a071a8b9dc4019f520616b92c37bfa6d3cdeeb94b1d683a3e5c89b1e1713

  • SSDEEP

    96:XEhYLWTD2vWtAg2KQKfiYwFpuD4V2X88ncI1j2Fdw8V4Gd37yelH+gfPpCzwDO4s:XeYK2vcAUpjwKD3swcI1q5Ld3Oebfu00

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23a642a13d5623e04bcdc826cb3fa191.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91cf710dca48f9e07b954850e0e26a16

    SHA1

    0d2c91d0345b7a5f2c2b0f370f52a13b2e0abc53

    SHA256

    eaefdf1077a8c3531f5dfaf29fd79445bb619c0244a7575d00e0caf612d82fcd

    SHA512

    b7983ccc8b1ab79b87bd5ba9eb5372623350e1930bbf47ce8f2af877acec10d91339e20f8aa935913258462fb586d75978ed6ec2d510420206762132cc520c85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    172cbb1346ff5bd88f440e208b708a12

    SHA1

    0961eb164c7b7c9c417ba63d4d2493777af61e01

    SHA256

    f62a1f7e52f4aa01fa30f3629b925459eeca44ea42e5586cff39e79cea04f970

    SHA512

    8d088bd461320ecac1ce67b589b2d03dead5d8fba161991f4485f8fdf3016a0109418a4595e19060856c4554897a4400edc980cbf4f5b5d4accb02d38ea928f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    502f5c73e7ed466e028e5e4062e52131

    SHA1

    8795abfc2b4246facbd225384b9670b190e77286

    SHA256

    27050e562b8526e53dea0298c842f6cb145796efd1eaca886170bf8ac8697911

    SHA512

    1c7723065358ff4ebb85df51513c91638c73f21c19de9dabe464e24d5d104cde36c37467a91fce327ac54441864d036517a32e9813f0e31190c1b527ecc02b51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    274bdd7ec36c7eaa47ced8111c8981d4

    SHA1

    47fe51a26fcbd1351451dfebbabc4eac950b9cc1

    SHA256

    44f0bc057271affe19cfe3f606c9801d19b299ccb578dce7920945e8b8eb2f29

    SHA512

    4ad28eeb9112d205e55bf0ff8b9ae6ead0dee0f6b4724b4c578f82d8339983ce2a572baf44508d591e05f3a5502c0fa02976259be3bc8cc1ee92dc8fa43bd6c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8d0d4d92e20d380d8a65ecdae0d1b8c

    SHA1

    2fd77b7f467dd9ecda9edc266e2f17785086ccf4

    SHA256

    d5f81d5ebbf5b7d16afe88613bb863c1dbdf593b656ec0e305be20f92935068e

    SHA512

    1d2b9879ed67de31f6797a1a232b631410ffe2590edf42857762139ecba34ea7caf3294b9fbb70d2088db2c18cb589719b94a0f132ce340e2c550568d58968d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9edc01ec8c8d92ac5635d8ac8c81abb

    SHA1

    bdc2f37e393b6b999fe30859d5a8f204442063a2

    SHA256

    cbf5283cf8c489f60314f8f018d4ae115369b82031edd08e494ba6c919242330

    SHA512

    5e1a3c3a7eec7f482ae1685ccc03dbf02c2a4e8e86beb5b40746f58565dd9f68d72c6fbfdff86a540277063b204f206b4129681f1c18f2cf53f680dbb0e11caa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    743b2b628829168a96f174489075832c

    SHA1

    b1f448f72a6d3e63ed51dd37a7a1596919ebf912

    SHA256

    53c03a261604d1da2c81f2cb6e5006e0f9316092a44ddb0da1bda5446fc83059

    SHA512

    367b825477b8c9e062704f013cb0a9f083452aecbe1491aadce37b7f1351a919cc8df13033448b6e61573333c8d4751da0bef5dab3db59f4dd5cd5f66e2bb86b

  • C:\Users\Admin\AppData\Local\Temp\Cab197D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar198F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06