Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    239s
  • max time network
    282s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2024, 07:34

General

  • Target

    rdap.html

  • Size

    26KB

  • MD5

    54757cafb38d6401bc84ef4d4c851236

  • SHA1

    a03dc3aba1048f6c950304093e281be10c44ebc8

  • SHA256

    60b057dcee51e5b7cfc32f9f5a7b9cfaad0a3039551b5ffe41865fb2d97f6b7b

  • SHA512

    9d955184dc49a1c265aadedefb5b0ae6c5341cf91672b9c7a78a53cbe18ec1d626fff7a82f5fab53d292acd7edc28433872b91e59f5f74a83741be08f6eba433

  • SSDEEP

    192:9Axrxv8UKdK5qrhka5SZ4t84gWiD16fAH8ejPjPBX7FtEX4lxlEQZlL79iCc5fgU:9Qp8bdK5qrOa64gh1TVRKoB9SNRg9Pla

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\rdap.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef8f027d918f9e848b2afb5911e8602c

    SHA1

    f97c0b8078d4388a92c4cbed8eef8b98cd69ccf7

    SHA256

    da27a68e394c7d365316529abd23f3b866c764959183d9c63244aa022dd1e346

    SHA512

    3b96531a33cf7b929fa13a6de78d29f96aa2f1a3118de9593a50256d154e5ad0e4429d6e63fb32a3bb65db6df7dec2c505d00e38bc4b1dc1244679a3818f71d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3233d449f8f69b0de410feea6829e22

    SHA1

    96e2ffd3f958d66fe1a6c0fa8beb4e52b08c97fa

    SHA256

    6241fdbbd873b132a8c9d5bdf45837de152dd0b79c2b3d28f132da7d1d51c395

    SHA512

    27215fdb447342e06b5547de8d51bb9511d8ac14402a59c0335364a3bfd851160d41b438d5d511dc3832089c8e2ffa545d4c03790dfb7c4d6bf88afbb96c50f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10af7c452192967567970964538b28d9

    SHA1

    6f5a600a2fc8c8b40b08123f00d24cdb7430dd87

    SHA256

    3169a246154830b178d1c94747db640c3290681c2a07f401d45cb2a6f1cd63a4

    SHA512

    b374707a5963efeea2ccb786f366f473b317256ec7aa2b67635afdbd25b546155fc2f98a40208dafe57934042bc72f0c8422afbcb409e1e3db5c9d3f2caba333

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcdfb4e0affb6abbf07e66de10128d9d

    SHA1

    ea47219bce75e0701894c89eba1e8b352b1e4488

    SHA256

    3f1d21cdc6a06be923d221f58ca6cc0aca2a9214d079362a3a5b51ba0be23863

    SHA512

    de698cf01881c96987e7064e3d02720f08c02cd6ca032e69ff8ff2bdca400b5a506e3b7d49604d71a36bc8a8f84c2ce692d9710ee7e3b8428929044e6699dfe3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8aa293ae04d41afbcda18410be7631e3

    SHA1

    985621a210a7216f450ddaff33521db67b07fded

    SHA256

    143fd73ca2b71904d607b74d5bf2f727e58249ba08d57ce28dfb331a2322235c

    SHA512

    9526d768b359fa9b6baa34701f05cba11600fa9191214e2eeb19af355504be529d0a060b3370f898bf75ba41020317f740df5b6aea9333f619a48b6825869e9c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\DE8MKG2X\c2y23vzfb5cg.statuspage[1].xml

    Filesize

    112B

    MD5

    63312794bb137e88be3205a9e2c8be06

    SHA1

    28769d47a6b4d493160723bc267742e788fab83a

    SHA256

    16a3d6486f33dc1de2f2a2c124ef965903a92bb4310d9d31c8aedae3bd5fae39

    SHA512

    7d9a628349d0214571f7b26c726438294873d65be81e522d6c064bdb69941b8dfe1ba6e5523e5c93fc22abe75dcdb197fbb3517c06b90550e3694b69328475a1

  • C:\Users\Admin\AppData\Local\Temp\Cab88F0.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8A0C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06