Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    180s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 19:39

General

  • Target

    3db407e71df6e7612252349b59a3137d.html

  • Size

    7KB

  • MD5

    3db407e71df6e7612252349b59a3137d

  • SHA1

    280676d4f927e54835664f2565f44d4be9fd0e2d

  • SHA256

    5ccf84aeb22b021d8ef393db9f340b79ca391faf70311af747c6a29aa37a3e7a

  • SHA512

    10b578875694f99f1647d782bd1ee6191bd36e9106c698543be8bf8451877ebfc155eac1ee0c905ebfbc2d3e36dd069025aea3e88835fbbb365f19133169e7e6

  • SSDEEP

    192:50bUynUZH3YtI3C7oHHrRKZmvY3JCrGbQNwTaK58L:5RZH34vZmvY3MSsNaL2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3db407e71df6e7612252349b59a3137d.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f74eb8ad6285b08cf1ab79155686646

    SHA1

    9547585e55a5323168f71b6e8d92057baa965ab7

    SHA256

    57639e2f871412b691bc2debd41824d90fb15536cfbf29dcb76ad58b28797d6c

    SHA512

    a0743dcc47633501bf2f80c366526e3b2092940290259f0fcbc9ab283134b6cc815f45af39f172ed1eb257a5ccc0be31742d5df6bbb401fccb6e2a89f3dabc60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    664587868fdc5e60456b20618b3c98f3

    SHA1

    02358dd6c6c0b1949b0b470d792a2434c3dcf35e

    SHA256

    36eed3cfecdf41eb02f4ce6ca6ab54d4cab1ec11253e707a861c762c605c32c8

    SHA512

    c81fc2741b5d0c0b2b00d269c4425c93663c2c1ecc2f1db7ccd759a4ff8aef89362ec624730d41ff1bf213c209f389065ea0c871efbab3016907c65fda840bc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06ae30926501532b3fa92058b602f918

    SHA1

    4e4a5147f5b42d6ac731eded7cccfb32172476c9

    SHA256

    b64f5501f6aa5beba8b3f1a69d79e94c2d99c699c90067c6dd37aed109e43e85

    SHA512

    39f01926de701de1bb4f6d3c77b7826f31203a10b70cbf91290587d864df29b032a25f97d90df91a283fbfa449b5cd61289f95b214345127e002c7937a967c5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c586ea8fc3f67cf91b936edd79b8124

    SHA1

    65b1e296beef6bd715bda75155915f4a0f24c007

    SHA256

    3dc62ccee5d0700c4f90346e982c35412dfa12ca6d015577e8659ff52d484a7e

    SHA512

    88918a8ffeb3d994977187946b395562604fd3eeae90d0f73ce334a9716c3e002274953804e8c22c10502be51d15c781f1c9acf45e2e7708cbe4fbbdac6454b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c329d72a5420c91cc2cf1051719b8647

    SHA1

    5d72467d2de86c97a08cea23227334e57e828689

    SHA256

    287658f731e00adbf4ddf2b340e752b508b1fb5080df024d0c30685a18c4ff48

    SHA512

    6d769991f958943e5f7110291eb90a38fb2f6e07950a614f962d197c3d1326dc06ae41cb040902e0a7d9ced1ae2e3bdf5d1a0cbfa9703e5546b58bcbea4f350a

  • C:\Users\Admin\AppData\Local\Temp\Cab823B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar89CD.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06