Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    12s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 06:14

General

  • Target

    2b62bab8b2a4068c68cfca1b9ed2dd8e.html

  • Size

    8KB

  • MD5

    2b62bab8b2a4068c68cfca1b9ed2dd8e

  • SHA1

    cc2d6b08da3124aa179934147ee578f7e20066c0

  • SHA256

    b60a0c7a09ca4dd419bb5d5225a8b5ca94d16e6fb7ff08ab97230cac87926d6d

  • SHA512

    9d48a73e7d44d29ce314b976e6de622e0d692e09e4bafed78ed791a65d377fa392ad88dffa35d37cea498d385d05c125e9118c48604d279aa8f9bbf09d1cd849

  • SSDEEP

    96:fIeAoHj0og5qu8zO6YeyY4lh/z+H0RfniwaS4:fIeAoHjm5MzTYeyY4lh/z+HknzL4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2456
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b62bab8b2a4068c68cfca1b9ed2dd8e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0888251e0311b570f904f47c5ba010fd

    SHA1

    37024be3801573a68c597475b21c6fbaa16884d4

    SHA256

    f8acee7692998920cd20a14952932646b329e74b176e094e02d627a86c478ce2

    SHA512

    deac1da3a5e80edb9f357bf7cb6335469890c7a47435c141f7ea58214acfe207ed261312292c4e26a81a425f269d9895fc118452d822e245585c168dd3f9d002

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d5686be8db3e9c49cb474e403bc6f2b

    SHA1

    1e7916e7791bdb1cffe75a894e1a2352eaf84b96

    SHA256

    eddc8526ff5c65dd7f69d0e862085685e3bc12ab1f9fa6e6c6a924e5d9933455

    SHA512

    a7ad91746dddfd5bdb30614dd8e34c8b3c3160992999c47503b343905606a35d479c240a40957e6aed5deb54000f6122570e8be9123377545260e790b3e48283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    748de591e8e3a1319975c37e028617bd

    SHA1

    ece87468183f0222babf59938f5fc3bd6110fcb1

    SHA256

    c0b845ccb6fbe5eb3cb1640f112cc082e7c0e0c262b0dd6ca0144b79447d4708

    SHA512

    73ea67ea2f76af5e859c178837c0181e8f98ff3007d2b0de000a87000b501505361b39b7918cb4110e2b89b263961dbfae474dc278809040c5a7ffcb4fff1f30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    857e1aaddb550a5737171878a2636fc6

    SHA1

    16f8ff3f4a29ea0ec2325fbe51f77756e710428e

    SHA256

    835a64a6290be0fb3c1c567a85e9d785bc0e37aa2f25696a503cb1f82b35cb34

    SHA512

    ac074a2480062ed23a0bee629a00c8886ac4674d009725f255ed0a5a914797dc3b1a0b5aa56ed4a588c67716d8f42f42aa792ae3929b6fba90c71a2d9a0a10d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9412a80d7ebabf4a41906e7030aae7c6

    SHA1

    d87962bf009badba0aa0898fe37ea4a34be6b7ea

    SHA256

    f0e40c9f6eef73efebf6832c037b8747d199177b7984fa898b283fb403faa8e9

    SHA512

    a870d6ee69a3345eebdb3d7775ecd7446bd31e12e17a9cab2b8475f33d7bada6ece906a60d3d5d4504aeaa95917e20e5e914765c9d1a5df08e7be90fbba8b60d

  • C:\Users\Admin\AppData\Local\Temp\Cab4858.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4908.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06