Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    173s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:17

General

  • Target

    37a1c8214105ec27d521be4663777827.html

  • Size

    36KB

  • MD5

    37a1c8214105ec27d521be4663777827

  • SHA1

    72abb4100a6bd00a56ceba6349d54b8a0a3023e9

  • SHA256

    e644802483421c98da5e0b3d333814afab421b5f9f94ffd3413b21f9ae17b18a

  • SHA512

    a5aa3bfce30b41f32367284221bac9f8a12d9333330a6f27c87c0011efded77e2b77c4024bb9bcc707d3f957d6a92382b307281a6edd2407fdf5129a3345492c

  • SSDEEP

    768:S9S7TPqGlEqGZ2wQzRwOkmKJZH2JaGRXamidaGnEmehH2csw:S9S/PzlEzZ2wQzRDkFZWJRigGEFhH2cF

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37a1c8214105ec27d521be4663777827.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40ce4d93c7774cb6cf3b1f1d2d98c456

    SHA1

    b20aa6553bfb2fa836c4071db13e4857be4a5e1d

    SHA256

    3a4d30c2b9fc5c94e76d7f2518ad2628bdcba276d3ac220822cb01db492a84ba

    SHA512

    6ecfa584903ddc86ddd98ba9bb15d72a31909b55eaf06bb64d503f0fe149636b736f59eb52b5ec0c542e05fc0b7cec7ac80ce4ac9a60c2dd6efe91d1018f9f24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a07c64f0b0481ae3245c12407ae4f04

    SHA1

    e112d68e92a30a288057ceaac229e48d4bb15548

    SHA256

    12f0a0ede32c90de80993c0359a05c8b0538a64ca4702bf5b11d49291a426530

    SHA512

    50759d9f6508936d1a9b072321d956eba9e5dc11589d92737bc9b28ca219ee25d50d5d9a848f06a0c9c049daeff0028fbfe55ca54d5cfc2e7195a3ab12e9c989

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eda38b46dd173edd7335a528eca1d237

    SHA1

    4939819828d766d188037a2f87694dabd8df23b7

    SHA256

    c18ca55c82bf075e199403fb0cb60d9413e293d66e1a98cc5e5f7b77c713aac5

    SHA512

    b4713bdaa7fc6dada25c7f59a2eda16206be98450fade2dad12e4dde4acf59e9348454d4231415ce4aa6ef2b7f940970d598ecf9fda7c2358660124e92794b3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99ac6e8e694384360305d7fa71023ad3

    SHA1

    b2f361fafa805d5d1ee97cf600d6a2859dd81567

    SHA256

    05a6db81f0928e9227b76c4ac497c2b204154c062d9a3fff3a725eae9544713e

    SHA512

    196a527262b249dfcb498406139f5c2075b065f2a8b4cc9c6872931dc529bf7ac4ceef75d98aff7cfc453bbd236e40d0e38cfe0f2e4020073c83e300b0f212d3

  • C:\Users\Admin\AppData\Local\Temp\CabEE38.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarFE71.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06