Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 12:57

General

  • Target

    36f7562f6ec0cdaccc6cc056a6e9b540.html

  • Size

    57KB

  • MD5

    36f7562f6ec0cdaccc6cc056a6e9b540

  • SHA1

    186b27461fcc012273d2ac2ad87f059b942a81ac

  • SHA256

    e232cfd84e409691319f709571826757eab88ca58bccd6c9e6db41972d7a6e46

  • SHA512

    64ef0388c5029c414ee375f22f433f2e8420b1899f7eb4c412f0d713699e6e56fef6406898f53f67c1abf4851c97462d9703170425a7237518f01281ae45f2f0

  • SSDEEP

    1536:ijEQvK8OPHdygHo2vgyHJv0owbd6zKD6CDK2RVroLYwpDK2RVy:ijnOPHdyh2vgyHJutDK2RVroLYwpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36f7562f6ec0cdaccc6cc056a6e9b540.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:17410 /prefetch:2
      2⤵
        PID:4068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64E544B76338020D780BCC40A2A2B366

      Filesize

      5B

      MD5

      5bfa51f3a417b98e7443eca90fc94703

      SHA1

      8c015d80b8a23f780bdd215dc842b0f5551f63bd

      SHA256

      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

      SHA512

      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

      Filesize

      471B

      MD5

      3eb1eecf898033820c8275f781e38d57

      SHA1

      ae8308d3c12f687cf347ce0cc60f252768edf41f

      SHA256

      2a8dc52e94660732672dd9aa03dc86d915729efd90ae7acd3f8071acf07d9e4e

      SHA512

      48b046cdaba92b5a81706ddbf92113deaf88b1473f8c60e491170f7bb143a1247caa0ee259322fb7905880ea4e90376035c8cf9a1ea049646bdd55a482a45a69

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64E544B76338020D780BCC40A2A2B366

      Filesize

      414B

      MD5

      7c65955400be4fdef4b34c8eb1a1de53

      SHA1

      d0e072359fc33c3ac1793e45257fffe3f0b38ca3

      SHA256

      41dbcadb670ae51dfddfcc1bc6ca8618b3775a4d982f7c0311c7c03f85c3b0fb

      SHA512

      6a336ff58c13a54efbcb98648b76d30dfa7b6a477a7f62ca1164e04d37cd28d6fc52b925c573a26e04d0eefb9a4f08cde0300db1221bea6cfc8be6085670ba93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

      Filesize

      400B

      MD5

      0243ae1b09c769876669d3e4e2413157

      SHA1

      f104d7799ddd16ae11d528fa48f74a138bd18f8d

      SHA256

      3a63663b725ed2d4728dbfc60e378a4f02e80f2cd14b797ffce76921af6b76a3

      SHA512

      ccb1c6df0c329ef916608f94bf5bf77492959c83281874c9568d54a43f11b9699dc121a19818deadab0d41f77438d8f5dc89f8dda524c94cf98a00a9924d3dfc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\82T68Z3F\www.dailymotion[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\82T68Z3F\www.dailymotion[1].xml

      Filesize

      166B

      MD5

      46fea924ef152bcb98f471dcf507d145

      SHA1

      b9afd79143ae22e9f1dc3fa522341f8aaaaec606

      SHA256

      83098672b851878e029d107f9f03b432aac6e77f0225ea3dfa87092b6f6f382c

      SHA512

      f30b907220786881cec7f0dc001257bd8847d0620fe44db646b767364cb2e5451cde155e4ee35275b8c99db83a4628e082650bf10a7606a119538c52f75bdfbb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\f[1].txt

      Filesize

      34KB

      MD5

      14fcca324fc8f9323f05bcc0a3137825

      SHA1

      3dd34e8c1934ca54aba3f20f9eec1f7f38402329

      SHA256

      68fd8a7f0a4c5e685c49243419b228e373ca1b8817c5544de063b41dfb02b1ab

      SHA512

      cebe182c2c92000841dae0b8eb4b670644566458fbe0046a9de4a8dde5bdd738dee5d3e4b7e2902f635caa701fa3c96c353112b61d094888f474b2613eca9ebb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\mem5YaGs126MiZpBA-UN7rg-Vg[1].woff

      Filesize

      95KB

      MD5

      dd482b790e27ef56d5bb00a5d1fcdd6d

      SHA1

      4f6d7bf62181a9d26055547a63c6ba67a5e8d7f5

      SHA256

      923a8e3065efb9e594320e03cc5cc5e343a52e60ab2be5b717b12f000aad36b3

      SHA512

      dd3e0e4884cf8e33bd1b0c9a7802e88e564c4fd8655d898ab1f4aca7a990b22cc46f974052d1f3c33423ff1e5559b01fbcfa9121d8d84f10b74f696b715dfcc1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\mem5YaGs126MiZpBA-UNirk-Vg[1].woff

      Filesize

      95KB

      MD5

      b4f76501db86eb7c731e0437151d304f

      SHA1

      8d38bab451d52354bd5c90a674f34bbeecbed3d3

      SHA256

      058795c57ae91386a93956ccde3b5460a120fad962c2b08ba79bbd11a9d934a7

      SHA512

      f661eb9acc27f471912b3abfd1cac126f03f061fca805fd36c1d2e40fdf148e96bc19ed34a8b755a18463e91be66f30c9484989b22247c55b6e780d68999cd4b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee