Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 14:28

General

  • Target

    43eaf44634f13b183eb9aa773cf51190.html

  • Size

    31KB

  • MD5

    43eaf44634f13b183eb9aa773cf51190

  • SHA1

    9cb52ca5e59764b422a5531f3bf00fa82accec7e

  • SHA256

    d0f9756f5751aa9d5a1f245040508f5fef60e3b2e8efacbfdb7d90d619375082

  • SHA512

    4aae6146639612e682cf64b6dfcb822ad102ca2e30a680104bc6d7af4ddaf091749c28921f32a90a4a5e020581f46a8ad153b87871fe5ee2dfcc2cfc52e97e78

  • SSDEEP

    384:l2Vz1XY1yO1XeqKVEFKYYYYYYYwwc3glQthY:l2leliw

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43eaf44634f13b183eb9aa773cf51190.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aed0bc9788ac37c11db67202895b597c

    SHA1

    3f5ea491d862e488f399d376c3afcbe22f6224c2

    SHA256

    b4bd5301d494796d4693e600b2964f193ba0f317897026ebf5eb67d7c1565338

    SHA512

    e5fb373bad469e2203a49d8f6fd40327794cb4985722e9a0acd949aa3b997238038e41f87ede2fe787bf966dfa516590bd3448cbef6b5d2c2a69a4f292085a55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21661381e4288db2b88cce4981bbbfe7

    SHA1

    2b43919d79d01d9d5ac01da090ab2f838f37e35e

    SHA256

    50475edf3c2253f3c8e58b6a2fe5363b8cae386f3eb0f9a8fe410d609ec32836

    SHA512

    6b8aa25e442dc94acbac73b3e07043e7d98bef75e296c6f7880496652bb21d83b599ac2a14cc7c42649c9655cc07c1edb95100227aa2da1d5e577631215b6c94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf57d6f08a2208b83cd598bc00fd6153

    SHA1

    ffbe8fd8b129229fba3364b1b2cd3951f529b36e

    SHA256

    934173191bfa3412c20a0c4116e55d8e68ff282c67580d7232fabd4b7670804a

    SHA512

    41ccca70245bb9973dbc5a974d52b755df1c2e1f68aad34572b6126d6206106b68c51e51538ad242a88c36c4570f54f6fb6e4edb44c82141747f5f708ee1274a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89392872dc5f4badc15c8b335d1dfce7

    SHA1

    a3d63d1ee1d71de7be43ca83005d60599e74bf9e

    SHA256

    d7c0b58414583e889bb53aa346bd712e2981b403989a63b960ee6ce120b7ea93

    SHA512

    b575de730c73bc7936a239dd4f9630becffdddfe775f5713cf99fef4a7a6439296dad6ff5053cc3623be33266a493f7b2e985bb94d13d1d75263ff416de4493f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e40bef25c5451ecebbcdaa3b304c6a6e

    SHA1

    f52e9477693454958a2da2b4e442dbc0ee7d112c

    SHA256

    40aaacfe500b3fc56010bd5aadd7d48a360efef2be2f094453a3001bce26e40e

    SHA512

    1995f3d589c8cde35ed82725c43be2431dc3c85a7a44189396f898deffe223d59273eadd570bda7cd4ec0042ca34ea80110b5a97da385935f2c8ca7046731439

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76bcff08bb94a55475d9189452fc7d42

    SHA1

    d1aea98c136f45ac73861d38cdb762e9f8343844

    SHA256

    dd6e9e9754d6d152aefa37f20a65f19146689cdcd82ea20bd0e3bd8cdf878f7c

    SHA512

    d48cc58fbbed5d8a991febaad8697b78e2d110fd48848e7e0a847ad538d349afbccd302a76538ec8b0611d156bffbb5c4446bad88359480fb40c6f691aec24eb

  • C:\Users\Admin\AppData\Local\Temp\Cab629B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar638A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06