Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 12:50

General

  • Target

    36be8a2f5f4923f8419c83c84cfd6985.html

  • Size

    34KB

  • MD5

    36be8a2f5f4923f8419c83c84cfd6985

  • SHA1

    9b6251dbdbbf0f40459622a62cf0279f1965e087

  • SHA256

    4599bfa08834cd2c6737cc206e477c91bb4d12ed7d514c1fd91fa1b73af4e8ab

  • SHA512

    9140a579e0d1533d6f31bec577c323706b58f61b7802509ecf86c86ae9494d1aca17239175c25b176273e515b54ffacef488bb3e08a17cb57ba40d58a9c89556

  • SSDEEP

    192:uwnvb5n+BQynQjxn5Q/AnQieLNnnnQOkEnto2nQTbnRnQOgMcwqY9cwqYmcwqYQj:5Q/Qm9Y5VOh7/PIJWO0/Y

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36be8a2f5f4923f8419c83c84cfd6985.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d84191b903b160e659634d663c14b8f5

    SHA1

    7064f9efea24a7518111ef1ed73b95be70dfe2e5

    SHA256

    48c79e6bb976cee05471995b9793cc3c9a7f2db51a09d2145f45b66e9ccfdbaa

    SHA512

    a8e400f5559fee8e33353ae95597b39d02ffca02c92223c053519644a0bd98aa1ad93f7125c8716ecc444f034df8996dd03e2536a65c5886a7768f9e155aaddb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff70a6e0323cdeb77c3370129b4bccce

    SHA1

    466e76358c21617b7b7221a525519e920ec8e19e

    SHA256

    5650a14abcb5dabc4807a2439c9075ef51273f27d8362114e684df21db14ae6e

    SHA512

    b68a6cd130e30d340cf8dfb299987cb3f529645eadc0db678f0ec01b4948869dbb878f69ee9632c91e47981179b2173435248bb2ebe6799bf8705528b8bc0ade

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    688fbc50a1a0787d794919e38b6fb79f

    SHA1

    689e9eb247becefa9d3bf407b5f69ff46a20f065

    SHA256

    f7fc258a357d4733c0ca12237e43f623ef39f08e37228a077ad28c6c7e1fcffb

    SHA512

    24dfdaf67b9a529c57b57072148a004cbaf8e67d92cf675568966bd0af9e8d43dd9aa4328435844c6c77f9ccdf55da47f37a385bda8a8c4266495323ccf49049

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7af21665ea9d699004c61075034b7562

    SHA1

    8ec5757f6b88a291716128cd4ade547181e4e2d9

    SHA256

    aef8de7b1c56dea5d12a9a6ec92e683da48e1b991f96b1a8f06a629930b1b82c

    SHA512

    ac30ee924bc8dacfe8728ea07b4a8c70d9a9f5b307707e56b68455464dee9a7056ff11fec3dccf00541aa747dcd64d03fe4be26d13f7383a6785c16cb0c5c9d9

  • C:\Users\Admin\AppData\Local\Temp\CabB156.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarC2F6.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06