Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/01/2024, 08:11

240102-j3lnfsgeh7 1

02/01/2024, 08:02

240102-jxblasdhem 1

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2024, 08:11

General

  • Target

    https://nl.arjo.com/unsubscribe/u/925983/4bb4c02d46e70910936bcbab1d3d8327577c11139e69712b2ee26b56c5d5fa6f/675779350

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://nl.arjo.com/unsubscribe/u/925983/4bb4c02d46e70910936bcbab1d3d8327577c11139e69712b2ee26b56c5d5fa6f/675779350
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7bde65951c78f9df7b0bdfce0657a9be

    SHA1

    f3aa7328113edc693aa1b515cfe98715cc5af220

    SHA256

    ee7eda79786d60b880b570d2a298e0ec6514877098062d682be55c42dfc6a3e8

    SHA512

    229469dff9d5906671f67ae14affa8c2e1d3dae691326f0cb664e4d3375c08c7c2a14532239f9ff8acf83c780bd5d0b1a00989528e73fb027d0c8f2e47d4886f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ba99646c9b41da0cfff1412d260c26b

    SHA1

    0044d6f1358cb4740a673a9c24f50550a3914af0

    SHA256

    30ee554ae43cfd2605176b4c7436b345119e72b84ebc877cbbfbb777ffe8d8a2

    SHA512

    8cacd9bfcdbad94b1264fbf5200bc1ad53fee9a905241f1cb12e742788d626ffd4d60ccc3fc819a3799cd47083fba01419a33f55d05331368a0cf689ffa6448a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3d78d2392165bc58bd8b9c462729f2c

    SHA1

    9a36c237da8c2d3572d1ea92eb4d10657e52984b

    SHA256

    eb129e39523b404f5c5b7c6c1d848cbaacb97f0f8a2a3a56a9f2693853bc53f4

    SHA512

    e4e8ae88bd719030660a626de06fd62f48d12201127683870cd7023b9e2580d80d732844b5fc678303082f7ab2bab94d7f9fb409f8eaf1d8d469ec002f078d0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ad99ca0de2e50423a5cd78e5fa6b34b

    SHA1

    40565d09055f1b14f802fa0abf876411fe4503ba

    SHA256

    c2172240e085674650fe1743d73bf7d06daf168e3e7cf613fd7e772a028ac5d7

    SHA512

    a99ac9a1613bf3df944f0b984340029a87fe941a980812acddaab17b0dee04e3ac7ca2ae549f2a74cdbe7517d30032d75504cb6464644ebc2bdf590f2367c753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a81a43a24415075229d5d1b0fcdbcaa

    SHA1

    226768903412028c9aeced4fa1b376ead3d0e7b8

    SHA256

    d5893dd47282312cb85cf456c4ba5cf4718686763504f7d3ca1321c5a7240b7c

    SHA512

    5facdc206ecd464420d0097381011f7292a26161bca8d6c439821892d1227f574a6e74c5c4088c0139f0772946d94b9601f1563ab8eae26cb05f63c60526684f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    435ae41cb2ce189f17c1f4eef335d461

    SHA1

    4d3e6cba2b3e8d8aefbfbee1870926ba470d0fb4

    SHA256

    5ff1c79ef6bd09b65681a7e79e2025cafd480196aad9dd7b469355bef16f75ee

    SHA512

    6f8e43558b8a035d8f955926f91b5c2265172b5a1b1ce09542723623bedb64f43a530d6652c63cf3ba6a9c32e8ab5181c6578b62b1c1ac8dddccbcb81f6a10db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b80e4d42ad364b8c1c7be7d1cfdc7b8

    SHA1

    2c498e1a366112c5861df8a45e91b68c2b73f123

    SHA256

    2df9efaf41ca9e68f2809faf80e10aab62aeaa140bd139096cfc6396f4b5e802

    SHA512

    8180f1d7a8e3398818306cb870c0e409e4c20798e288729f3dc70a1cefaf2bf799c9bec0ead1bb98f07f740b763ae97fdbbf9926505afc5dc744409c8d59881c

  • C:\Users\Admin\AppData\Local\Temp\Cab5209.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar53C1.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06