Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 08:32

General

  • Target

    45c505cfa92386c1d7789b5efa77e8f9.html

  • Size

    6KB

  • MD5

    45c505cfa92386c1d7789b5efa77e8f9

  • SHA1

    80bd9bfd77451c5b5757d2088e08cef6a0d8b4fe

  • SHA256

    ecc4f343f8e2ab68b23b11d123a82d0e4389c5ded4019ceef64e9b1ebeef056a

  • SHA512

    23c87356588087e760d7dee126f38be64d03efd740fd93ae788761b1a5c5fba8a348bbf234378d0094a154e350b2bea703f4daf451fe20956a9915e6e10d3aee

  • SSDEEP

    96:PZqMrQ/ybRW/ShzVZQImCqzyGkrEvVzF7UYQZEQ5Gmuawc/bPEr:P8YQabIShzb6+nEvVW1L5GmuLc/TU

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45c505cfa92386c1d7789b5efa77e8f9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:2
      2⤵
        PID:2896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      142fe26470607b67197be7312d0b098a

      SHA1

      3ed77c05e0b9026ce7a56cad160e7066e8e668d0

      SHA256

      51e93b92426de8e15bc4d2c635c0be4bee89b4790cf70e27363201fd63c68e5d

      SHA512

      5fd272df362adec17aad2d65bb396d2f4ff17a13cfb6dd3e296baca17d8085d2c7342ae076923bc87c2453d17b38ec225e894ec11be4ed884f8f4e538faf1f7e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      887d0af7f960723aa5aef2008030d5c5

      SHA1

      06e39b44a9122da626e4d327cd9d9626142c6b60

      SHA256

      8248dabf5da70f4947a73c0798492ac3f0e178a0628ef2210bff327441691a9d

      SHA512

      7ef0959d09a78940acf2f1f3041c3045b3c7081d4054f2ec007421345ae821251865a7158f4fe584e3be9f3919e50d186530f8c406db252f0d8a0c158c56f681

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      49a9eb19f7870a30c00a143d6ddfcafe

      SHA1

      f0849e3e5a9828fffef8b82ac0662826b1021329

      SHA256

      f4480d54c5127797b113f0bfbd0f4b78cf22aac1ccec7f5a15148847b77d730e

      SHA512

      c069118872afe9c8b67d1bf1a24d6ba06214288cd65f4418eb0002b5495eecb1027d042ba74cf532ed6463101dd0a38b3a7af2b93bdcc85e0926ba51a29182d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      481ee7cae23f3034a3baa410e9d1bce6

      SHA1

      6dd3844fb33d5e7f028e0dd10f1ef58918cb23a2

      SHA256

      5833b4b6a514cf589050c8ee3e19d55c5ac7c90560a44a8f1ea6e7f70a83b9f3

      SHA512

      723a55cf0dfa741bb5761f53f7ed35689b0f9941237a725599e552a740c541f1af576f34b2f654bf0803793498e10a692f049f01aef1524533a74a747e94b86f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ae0587d73d5223ba4e7b620f321ee127

      SHA1

      5f37e02fba52cc28e02cdd71e30d9fdd5f8d8edc

      SHA256

      9d24bf86c9fd59be4e0da69f3a8fd7fb155b12b0a2729b872958afa9418aaa0b

      SHA512

      265267e125b0e0832900b9818de1a8e6b45ac7aae1d2a49925fc30e46e94de0ad525234c8deb9e181471055f295b05209fa2c1a38d430d9211e5adc709c3e25c

    • C:\Users\Admin\AppData\Local\Temp\Cab238A.tmp

      Filesize

      22KB

      MD5

      de873249cbeece0d5fe92c45e26d8b49

      SHA1

      751515c3afb86da9534139e42c6c557af068328e

      SHA256

      02b8f73bf53e43091f3abeeddc4ab084e83f20c5ea81c06c8ccf028af2a907b6

      SHA512

      50a58ee1c12ec79a5279a40f663266c34be73b421f7536838855b0f5e6d87cd859119c14fa789b713b13027389683697e368c3182ae6bebf33718c3d66e519fe