Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 22:39

General

  • Target

    449cdc64fd6ee4b2e2752cea948fa7e7.html

  • Size

    57KB

  • MD5

    449cdc64fd6ee4b2e2752cea948fa7e7

  • SHA1

    4443b4208af1426b17a1d8794d1a90cfc3a0b177

  • SHA256

    e4bf11de8746d8e494b14336b2749042857307bf6354573ef96dd697f91d87be

  • SHA512

    a5e1105270db40997e747222e87f70cd01e0f8d803557000ba4074710688c29a811c944e5cc4d92bf17d580b3f284ff79b0c4b228fc656fd51d56d8ee768cbb1

  • SSDEEP

    1536:gQZBCCOd20IxC1PlTfffkDfqfSfRfVfXf3flfyf+ftfDfHf9fAfRfpfYf0fwfxfC:gk2Q0IxUHgCapdPPtamlr/VY5hQsYppQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\449cdc64fd6ee4b2e2752cea948fa7e7.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eeefd5bdf0a7f26f4ebb3bd5d4117df5

    SHA1

    48d36bf51b84ac7fdbfff082dcb321c7e553704c

    SHA256

    8308171e78f0efcf5ef94ebf8a72979698c3f2ad276520bbc7c04e2f0d69248e

    SHA512

    5df2fafc7d36744d7d5453069bdc4d04812792349a36301e4a9b3ac42e631f7cda79eb4b1a787f589f5bfa46c92bf2aab1e71c483f37d4ceea7f7cbb8929945f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdc9b4aaa06e60f9222344fb3b670862

    SHA1

    0d4214ce16b97635002cec752d0c02842c7f6f94

    SHA256

    acbb4350a25de6b4079545cf85880b4ac5455a52e2cde552a43033336d685e5e

    SHA512

    f7cf1fe66b5d14f8552ccd2dbcd085a0e484648b39bafe108b1639a228ee385d2a5a7cc72352e1e8531753552688a40e9db565b1cb0c0b7665492bc22b8e6d27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0cb649fe9a10e154ab71d0a6d80663ba

    SHA1

    dda020b62a110192e1d2fd1fb21171ae0148456b

    SHA256

    81bbf222d96368ad040823ddfd92efea333003a26fe8dde5041288327f955d6b

    SHA512

    737b71e50f8c5f6ede8ffee3086c84ce01758672cf530c84301232268cdb9347cf573d858c6b2803c955b78f718e01d615f28398c03d32ad0a757de01284fe24

  • C:\Users\Admin\AppData\Local\Temp\Cab7744.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar78BE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06