Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 21:40

General

  • Target

    3df413a0e151c8734ef58177e96227f6.html

  • Size

    57KB

  • MD5

    3df413a0e151c8734ef58177e96227f6

  • SHA1

    8a045ce9c84e15fe83508ecc5720d58745b7481f

  • SHA256

    e7b9e1cde8f91f8c9ed81ff89ae3d403303d0c6ccd7025abeaaabfdf105764c1

  • SHA512

    e1ef049877486d1bc6dae610780ff60e4e4cace6841259664038c906a3c536cb13d29673ca47410c99618f9199b9b2ce4e0fdcbbd995818dbef6a672b8e49d4d

  • SSDEEP

    1536:ijEQvK8OPHds15o2vgyHJv0owbd6zKD6CDK2RVrozwwpDK2RVy:ijnOPHds42vgyHJutDK2RVrozwwpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3df413a0e151c8734ef58177e96227f6.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e62aeea7a570bcc2fc8eb286001c4de8

    SHA1

    656eba62f8d2bb6c9e2ad91cd657fbb2032085b4

    SHA256

    6982faae975a0cf84a3463b7e84b9eae8e9899b11f8b0fdbeb16f538b3d1f9a9

    SHA512

    40ffe3ae1b054452adc11d043a38db1d1ae6bddfe01b5da1578ce4f5b6ec0c76886a7f4dfc9e3e665a9c0033100d31e5c6f48814a021cfbea9c4d7a86dbc130a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87bea88061370079fd7fb05bc5036666

    SHA1

    f5e3924f3bbf2d69e3e8fa1cb8a9e5a5b71a327a

    SHA256

    6ff310ade5df5740c6835af1b40d98ca5eeac88a8827e37b50ac7049017249c3

    SHA512

    987a31016662ab26d11a71b2adb31010561b397d9d078c5498b50bd9468f196e14d39cfb0dd758e514bfed74278a178baf9d31b1eceb4904a5512e0b43c4fca0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    55ac8bd5d01603b83de26bbf62b1f795

    SHA1

    e37c25620729167c28ed53d17d55377a7951ca77

    SHA256

    29b88161f4f725f35c50371d0aedc6b24d02cbc2dbee7dc75cc1d7ead4bf357a

    SHA512

    ebc4a8c8527b9e24a99c38eeface1907adb5eeb6e58466c292cb449d9a9ac2035e4ef38e4e2ac1670b684feb3c848f7ee02eaa8a25f5204729d589faf10df64c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc65604810636bf12a21071a9a4f0dac

    SHA1

    239c84c177f1e14eacde35bcf35229a67969c631

    SHA256

    5f88a6eee65fba478197e8aa27de60f29a02068c9c0f2c2a07d20d5926eb2abe

    SHA512

    caf7ca3c86c76b4fd9b41c871a90cdc38654b98d5b399c332a0100516c03c9421dc48d7a0fdb4c47464ef53c79ac66c05d8b6189f8515cffa8e7ca53798d1fb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    832e65f448b55fab22918dc389094552

    SHA1

    64d732eeba170bb64363fa635cbe66c0c806807a

    SHA256

    ff1142d3b17f6dc98b8017aad825d0f17bc3a49738ca4fad07e204191b66a7d2

    SHA512

    ad65622a1ec164a472a6764ecf8c5b2dc26048f1203dfee27c17ffda1d5ee8036f3473eb3c0c589d88f7f5bb89665da1cf47c9df241e0f41c4692bb6400d3567

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d229534f23dd22de8f49464d0f40c79

    SHA1

    ded6a26cdd1dc0e9697577611fdf55d8d9e0a018

    SHA256

    ca459eb57d45fd839ad5b2302d43ab174862ce0fd071bab214d6f51a84a87e18

    SHA512

    69c4037ec21377b7f34ab0063eab23b4d79584d748aeaf10de5573cbd154b1a80914ee31e5bd8caa9f333cf746cfc34fa2c9b4b8cc4034e0923f670dd0273f9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db5dc2a9e0888cee5efff908bcb16fd7

    SHA1

    df09b11c318193cfb2f3c38e221fdaa83b3a54cb

    SHA256

    b4c6adc716ded9c05780c370a2b3517717314675ed48edcffce095f8876e52d2

    SHA512

    ae2adc11257001017a885c4a9c13fc1956f15861bc252be84b0cbde16b4480e02799b987115e892546869291d38599c332d177cf88920e7f6cbe48c1e42f03d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17a0488f3480753cebe67f18f63e1768

    SHA1

    152ae59b7eff033f55c74ec0116ced3deed2b5fb

    SHA256

    8a77c42694f42985aecaaebb88a0889297554c3e67eb6bb41feee8bb842357a4

    SHA512

    37cc4cf9b933b4f83e935ce4489b520be17e5fe5e91dc315b74b877aae07e595bb154233723d59d122cac480f410f20367bea5f43b95a39a1b5a2e4df8b3bc68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f95be69ef984971dd30725d82dfb3f7

    SHA1

    f4cf33cd4702a24a560f70a2fc3755cdc63237ae

    SHA256

    93adc5950ac6bf8b099851ce2d1da40daff4f1a4c291bd945d616f402c6c6d14

    SHA512

    4f6484bd0d6f5e817445eb71181f7f9cfa9109b449793716d67b0e9c3565b443ff66b7c4732738d493bf375551f0ad61cc9bc2386cfedc9ee1d17dfa044914e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b50a0f13e91667676237eacf352ac7b6

    SHA1

    abc7f096b79da25f16d2ab5246067fd26e1aa1fe

    SHA256

    c7e5ddea0a9eb914fc00538ce916abe9eae3b968ae511128bcb7386d8e010f09

    SHA512

    a27d3629b382317c7cace9c533326baaad9aa6f042451e7c3e16b1592eb15d7b479dbb97060ecf0525b91b5e0d745777b48ec030db6845245060fba65f16b5b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\f[1].txt

    Filesize

    34KB

    MD5

    94baeae5a431d3f4b6a82c4a91f59511

    SHA1

    42afc199c30c4adf7d69bb10cc1b7674102cad6e

    SHA256

    df5d165b5af8ba63c3b606253a8c73dbdc132bc66153c867b4acbe47efa55f0b

    SHA512

    866c5064e7a88ff99696a64ef6cb3a770db74ae99d773754613422f6fc4d850eb32945d57aabcd0cbdbb9bec74ab2627a7d7a0cd14bd465086db0083756f0017

  • C:\Users\Admin\AppData\Local\Temp\Cab625C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6434.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06