Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:43

General

  • Target

    2a7abdab1ede459c40c4e396d3180881.html

  • Size

    430B

  • MD5

    2a7abdab1ede459c40c4e396d3180881

  • SHA1

    ef7e6605d13349a5d06ca5b2a871c7fede82030a

  • SHA256

    d796fcb00e117dc79f683e09030f263e8418313dc774f8b1b2c690ceff0f58e8

  • SHA512

    438490028d88e166960e1e726ec5e0266caed11350f0dc6a7785bf9150820e7167d35494e248a1a84d9650c0f71b014a08173df7e8bc777049b39fe21baac8fc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2064
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a7abdab1ede459c40c4e396d3180881.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    69babc850036368928ee90f3abbf8e12

    SHA1

    63b731c2a42b78e633af55caf9521b9bb534132a

    SHA256

    2d28e86460beb89e93ba6377d3555080bb9f3867a773f18f5d95d3c6cbfa67fc

    SHA512

    c8e80e5efa43562338f9e7f8a6209531bd0ebdcc8e10dda9809dab1a34e9dcc69ee5164e05f40f93778371a0874d2a5c0a3b8069c3e14d8a648218c8abd08938

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1e6b18c3193f81005271053e3034fc6

    SHA1

    77276ab055391f1ee5771a3252087da734baca3e

    SHA256

    f3bfe8f67ca6a1318539eb952afab40a94eb51d27d17d82a58b71e81735a92be

    SHA512

    1faccd1e1583d65a455a3d449d8e1bf79032519f4cc99dbc94eaab35577c0e31b51b4e17d1cc6365a74d10b39c22088c13d07f792dc6a2790012f1b93e7794ee

  • C:\Users\Admin\AppData\Local\Temp\Cab21F4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2207.tmp

    Filesize

    92KB

    MD5

    71e4ce8b3a1b89f335a6936bbdafce4c

    SHA1

    6e0d450eb5f316a9924b3e58445b26bfb727001e

    SHA256

    a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

    SHA512

    b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7