Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 18:29

General

  • Target

    419a483748dab21987cbafa9623a4262.html

  • Size

    13KB

  • MD5

    419a483748dab21987cbafa9623a4262

  • SHA1

    13d73cc490bf1aa1ae49dde393ced9118cf0b4c7

  • SHA256

    3ead1a933b3a2afafbcea653c5b918226751dbe720e8458c343313c6e31206ee

  • SHA512

    df128c0c44fd7efa55243e96505b4609d3448c6ac00acebd5e0cd9ae83ce88ec0be4b590054de0fd2a5caaeeb724b6637be4c76757865efc228d4e8144782b17

  • SSDEEP

    384:vUWUUpEXVg7nVhiBfp7IhZ0Cxhnl2idJdU:vZhZ0Cxhnl2+JdU

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\419a483748dab21987cbafa9623a4262.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de78ad5c018adcd721715af565ba4d5a

    SHA1

    2dd326876291a0bea953d98b178b9599a11f7a53

    SHA256

    a5fbd7088568e7f44ecf4552a12ed9fd35088d1c912cc8b21aad549d2e217c2c

    SHA512

    044171383e2e52238a3c11f56e8b9d48890cfccb6a3906f21946a0dce4fac9597ec39070f729f7249c06c418f56f970aafb63c1bfccb2c5245e2a46b03c59233

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    586cd55ff219091d0539281786bcee91

    SHA1

    d2bc3a08948689805e3b9fe0ac213fd46a5b277d

    SHA256

    92505df8d4e89feaf4cce0f9fb117d71fac085c43077feaa09019ec0e7556db5

    SHA512

    8bf35d8efe047c970ce242bd5dd79c3672c8de25d4df24f938fea955f60ca504a19e5dcbef1987f52ef95c16276cdcc1fd4e2f004765e8c223c2e5d4b44a2e20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c61e21a95f2c107ee38922d70eb6ea8

    SHA1

    17af4e4378e9e71e90f2c6b7187bd07664c7a9a0

    SHA256

    883607e0a3115eaa5c573ff1833878580265772e141d259468d5d5956a82eb50

    SHA512

    022a076fbde8fd69dee6e98e96519dea0554ba6c4c372e6d19345153e72afa9c61267dbe99b0e38c21591caf18751d5a093008ad8a3590492305da4e7c4b40df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40a6cfa7e5cbe17d05b9e9dc3297dbd4

    SHA1

    8fae85abca7c959665f358f7f16180992d8f7045

    SHA256

    2fc8bbeef107b06ea80540ae923ba4ee2a1178c660fa170b1055d1acbdb57578

    SHA512

    c87e16871e1c4fed8a22678406beab9c444563799700c80f1149dadd65e75fd8a79fc90a1be413122e146068a6cf8be6afc143b012c8f2d066af277e07308e65

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\bdNsDzuyI[1].js

    Filesize

    31KB

    MD5

    136bc91b923c115f678c13f3740bf8fa

    SHA1

    d8044de6e6a8b05f087f9fb73545d5b2e9666d61

    SHA256

    46e2c2af87720b7ae5a86434547bd9bef9ff21fab2956b64bc48f17dc73c63a7

    SHA512

    2ff613aa8dc2887a5c2f9d8d40e618ef82b8ffc46392affd32a9fa2225360f1db5244a51f82d5eba8fcf3c200f179da20433761a3ebb6fce0e4ede99d129a3cb

  • C:\Users\Admin\AppData\Local\Temp\Cab93CA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar94E6.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06